Microsoft Patching 17-year-old Windows/DOS Bug
A patch is on the way to fix up that ancient Virtual DOS Machine flaw.
Last month we reported that Tavis Ormandy, a security researcher at Google, discovered a security flaw in the Virtual DOS Machine that can allow a nefarious user to inject code into the kernel and possibly install malware.
The flaw spanned iterations of Windows operating system over the last 17 years, including:
- Windows 2000
- Windows XP
- Windows Server 2003
- Windows Vista
- Windows Server 2008
- Windows 7
According to the BBC, Microsoft will be rolling out a fix to this bug in a February Security Update. The update will fix five vulnerabilities that allow attackers to hijack a Windows PC and run their own programs on it.
The patch is expected to hit on Tuesday, February 9 but it's a good idea to have automatic updates turned on so that your OS will do the checking for you.

========
One more thing: This ONLY affects 32 bit Windows Versions!
See: http://www.microsoft.com/technet/security/advisory/979682.mspx
=======
Affected Software
Microsoft Windows 2000 Service Pack 4
Windows XP Service Pack 2 and Windows XP Service Pack 3
Windows Server 2003 Service Pack 2
Windows Vista, Windows Vista Service Pack 1, and Windows Vista Service Pack 2
Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2*
Windows 7 for 32-bit Systems
Non-Affected Software
Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Windows Vista x64 Edition, Windows Vista x64 Edition Service Pack 1, and Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2
Windows 7 for x64-based Systems
Windows Server 2008 R2 for x64-based Systems
Windows Server 2008 R2 for Itanium-based Systems
Use spell check please.
sons of b***es been lying to us AGAIN!!!
then again, im sure we all do
they finally fixed it.
========
One more thing: This ONLY affects 32 bit Windows Versions!
See: http://www.microsoft.com/technet/security/advisory/979682.mspx
=======
Affected Software
Microsoft Windows 2000 Service Pack 4
Windows XP Service Pack 2 and Windows XP Service Pack 3
Windows Server 2003 Service Pack 2
Windows Vista, Windows Vista Service Pack 1, and Windows Vista Service Pack 2
Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2*
Windows 7 for 32-bit Systems
Non-Affected Software
Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Windows Vista x64 Edition, Windows Vista x64 Edition Service Pack 1, and Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2
Windows 7 for x64-based Systems
Windows Server 2008 R2 for x64-based Systems
Windows Server 2008 R2 for Itanium-based Systems
Some how i dont think they lie. In fact they never mentioned it was rewritten.
it certainly improved coding from windows vista but not rewritten.
+1 nice find shadow.
...
Oh wait...
Cheers! xD!
7 is a Vista make over. They took vista and deleted all the main complaints and added the top features
everyone suggested. Any 64 bit driver that was written for Vista will work with 64 bit Win 7, i have downloaded and used 6 Vista drivers for my Windows 7 including but not limited to Printer, and they all
work perfectly. This is such a small hacker risk that Microsoft didn't feel the need to address it till now, and
probably the only reason their addressing it is to shut a few people up. Go Windows 7(Vista)...........
I would love to, but unfortunately I need Windows to play me games (ie Crysis, Far Cry,etc).
yep, programming is hard so it is understandable, taking 17 years to patch a security problem, especially when your busy making the OS slower and adding useless eye candy.
Microsofts response to taking 17 years
"Do you want it done fast or do you want it done right"
heh, +1 good sir.
http://www.youtube.com/watch?v=USni2nTweOE
Not sure how well it works tho.