Feeds

Windows Firewall exploit overhyped

Nothing to see here, please move along

Intelligent flash storage arrays

The release of an exploit that means a hacker, who happens to be on the same local area network, can knock over Windows Firewall on machines running XP has created a lot of publicity, despite being not much of a threat. By using the exploit, an attacker could disable Windows Firewall on a fully patched machine running Internet Connection Service (ICS).

ICS allows small businesses or home users to share an internet connection through a machine which acts as a hub. But with the advent of cheap routers few people need to use the service which, as nCircle points out, can be disabled quite easily without turning off Windows Firewall.

Turning off the firewalls of users removes barriers to potential attacks and the exploit would be more noteworthy if it worked remotely, which it doesn't. Attackers need to attack from inside the same LAN as potential victims, which greatly reduces the potential for mischief even when attacking basic home or small business networks.

As Secunia advises, the best approach to dealing with the problem (such as it is) is to find another way of sharing an internet connection.

Now, if you'll excuse me, I'm off to investigate reports that cows have stopped producing milk in Somerset as the result of an IE exploit or possibly generated the influx of whiskey-loving Romanian witches. ®

Intelligent flash storage arrays

More from The Register

next story
Hi-torque tank engines: EXTREME car hacking with The Register
Bentley found in a hedge gets WW2 lump insertion
Trousers down for six of the best affordable Androids
Stylish Googlephones for not-so-deep pockets
What's MISSING on Amazon Fire Phone... and why it WON'T set the world alight
You fought hard and you saved and earned. But all of it's going to burn...
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.