Camdog
Joined: 08 Aug 2003 Posts: 606
|
Posted: Sat Jan 14, 2006 4:56 pm Post subject: |
|
|
| fyrewulff wrote: | I used to read Slashdot but they're too extreme and slanted anti-windows to even be relevant anymore. They just go for any jab they can get, and a lof times even disproved right in the comments under the article.
The actual exploit is in how WMF works. the explot was a buffer overrun in the function that executes the filetype's associated program, so any program that interprets WMF (ie, Irfanview) was affected. Basically it made Windows think WMFs were a/wanted to run an EXE. |
It's even lamer than that. The malicious code is simply defined in the wmf escape() function, which was designed in the first place to run code. It's not a buffer overrun bug, it's a feature.
And at most 1 out of 20 posts on Slashdot are even about Microsoft. |
|