Posted on 02/03/2017 7:53:50 PM PST by markomalley
Please don’t spread FUD if you don’t know what you’re talking about.
This is a vulnerability in SMB2, NOT specifically Windows. While Microsoft operating systems DO use SMB, newer MS OS, such as Windows 10 and Server 2012R2, use SMB3.
SMB2 has been around since Windows Vista days. This has nothing to do specifically with 10. You are just as susceptible to this attack with Windows 7 or 8 as you are with 10.
It’s also important to note that Samba is the Nix-based port of SMB and is just as vulnerable. This means that Apple and Linux devices can be affected under the right circumstances.
...and for a nice topping for their Sh**burger, a computer terminal that’s programmed to alternately give a login page (non-responsive), a browser screen that only displays YouCan’tGetThereFromHere messages and (if they ever get to a command line) the BSOD followed by a system shutdown.
From the article: “he submitted the bug to Microsoft on September 25, 2016”.
Microsoft is the problem here. They were told about the problem and failed to fix it. They can’t be trusted with your data, it seems.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.