Thursday, June 20, 2019
Do not need to divide it Coursework Example | Topics and Well Written Essays - 3250 words
Do not need to divide it - Coursework Example(CVE-2003-0352, 2003) On wise to(p) or so the identification of this vulnerability in its primary product, Microsoft released a bulletin with a patch to plug the hole in the system. It did turn out to be successful and Microsoft released it through the Microsoft Security Bulletin MS03-026. On the release of it, Microsoft recommended all of its Windows users to immediately install the patch so that any further severe persecute could be prohibited. The virulence of the threat depends on the impact of the exploitation made on this vulnerability. (Microsoft Security Bulletin MS03-026 2003) The report details about the technical specifications of the vulnerability, its severity level if it is exploited in a Windows operating system, the methods and details about how it is exploited and the consequences that it could lead to a system. The report also aims to provide details on methods that could be use as mitigation processes in solving this vulnerability. ... (Reuvid 2004) The severity level of threats that could be experienced with this vulnerability was very critical. Most of the networking systems depended on the international connectivity that was capable in Windows with the help of these interfaces. As a result, critical business functions that completely depended on Networking came under severe threat. The versions of Windows that were affected by this vulnerability includes 2000, NT, 2003 and even Windows XP. More severe consequences were faced by those systems, which did not have a proper firewall system. Before gaining details on the vulnerability and how it is exploited, it is mandatory to know about the protocols that have been used as the medium of access for the vulnerability exploiters. RPC and DCOM protocols RPC - Remote Procedure Call as defined by Microsoft is, a protocol used by the Windows operating system. RPC provides an inter-process communication mechanism that allows a program running on one c omputer to seamlessly execute code on a upstage system. The protocol itself is derived from the Open Software Foundation (OSF) RPC protocol, but with the addition of some Microsoft specific extensions. (Microsoft Security Bulletin MS03-026, 2003) The Distributed Component Object Model also called as the DCOM protocol allows for a seamless communication across several networks for multiple software accessories. The result of which is a direct communication which is uninterrupted and can be easily established across networks that are using different transport mediums. Examples of such network transport protocols include the universally accepted Hyper Text ravish Protocol HTTP.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.