Vulnerabilities discussion
Students Name
Professors Name
Date
Under the Bugtraq, they have provided a form where users can subscribe by submitting their emails and addresses. This subscription will benefit the subscriber through receiving notification of current common vulnerabilities that have been identified for various systems. This assists the user to be capable of protecting their systems against attacks that can be carried out on the current vulnerabilities that have been identified. Further to that, this tab shows visitors who visit the website common frequently asked questions in regards to common vulnerabilities exposures and exploits (Securityfocus. 2019).
Under the vulnerability tab, a history of different common vulnerability exposures has been documented. These exposures have available exploits and solutions provided by the system vendors to assist the system users to be in a position to protect their systems against attacks. To add on, users have also been provided with a form to enable them to filter vulnerabilities by the vendor, title, and version. This is a quick way to search for vulnerabilities that only affect systems that users do use. By any chance a user has exact Common vulnerabilities and exposures (CVE) number, they have been provided with an exposure for quick searching using specific Numbers (SecurityFocus. 2019).
In PNG buffer overflow vulnerability, there has been provided with various tables including, info, discussion, exploits, solutions, and reference. It is under the information that the user has been provided with Bugtraq ID, Class CVE number, attack method (remote and local), published, updated, created, and vulnerable system. This system includes Microsoft Windows XP 64-bit Edition Version 2003, Microsoft Windows Messenger 4.7 .3000 (Microsoft Windows XP Home SP2,+ Microsoft Windows XP Home SP2,+ Microsoft Windows XP Media Center Edition SP2,+ Microsoft Windows XP Media Center Edition SP2,+ Microsoft Windows XP Professional SP2,+ Microsoft Windows XP Professional SP2,+ Microsoft Windows XP Tablet PC Edition SP2,+ Microsoft Windows XP Tablet PC Edition SP2), Microsoft Windows Messenger 4.7 .009 (Microsoft Windows XP Home SP1,+ Microsoft Windows XP Home SP1,+ Microsoft Windows XP Media Center Edition SP1,+ Microsoft Windows XP Media Center Edition SP1,+ Microsoft Windows XP Professional SP1,+ Microsoft Windows XP Professional SP1,+ Microsoft Windows XP Tablet PC Edition SP1,+ Microsoft Windows XP Tablet PC Edition SP1), Microsoft Windows Messenger 5.0, Microsoft MSN Messenger Service 6.2, Microsoft MSN Messenger Service 6.1 (Securityfocus. 2019).
A remote useable buffer overflow exists in MSN Messenger and Windows Messenger. Such susceptibility is linked with the analysis of Portable Network Graphics (PNG) image heading information. Fruitful use will consequence in the employment of arbitrary code in the setting of the susceptible client. Attack vectors and extenuations might be dissimilar for MSN Messenger and Windows Messenger. For Windows Messenger, the aggressor has to take off the .NET Messenger service and the customer has to be configured to get alerts on .NET (Securityfocus. 2019).
The moment an attacker visits this website, he is capable to narrow down the type of systems and their versions that are vulnerable to attack. Furthermore, he is provided with information about available exploits for this vulnerability. Also, it would be possible for MSN Messenger to be browbeaten ca numerous techniques in a client-to-client attack. Likely attack vectors for this susceptibility in MSN Messenger involve client presentation icons, Custom images that are portrayed inline in prompt posts, Thumbnails of pictures that have been transferred, and Contextual images (Securityfocus. 2019).
To mitigate this vulnerability, managers have been provided with a solution under the solutions tab in PNG buffer overflow vulnerability. In the solution tables, security managers are required to update the affected MSN messenger versions and affected windows operating systems to new versions as it has been documented on the website as they do provide a fix to the existing PNG buffer overflow vulnerability (Securityfocus. 2019).
References
Securityfocus. (2019, July 26). Symantec Connect. SecurityFocus. https://www.securityfocus.com
