Windows XP Configuration Vulnerable to Zotob

Today's Best Tech Deals

Picked by PCWorld's Editors

Top Deals On Great Products

Picked by Techconnect's Editors

PCs running a certain configuration of Microsoft's Windows XP operating system have the same security vulnerability exploited by the Zotob worm that ran riot on Windows 2000 systems last week, Microsoft says.

In a "clarification" issued this week, Microsoft says that PCs running Windows XP Service Pack 1 are also at risk if a file-sharing feature called "Simple File Sharing and ForceGuest" is enabled. The company hadn't seen any attacks trying to exploit this scenario as of Tuesday, it says.

Zotob made headlines last week when it infected systems around the world, including PCs at Time Warner's CNN news network. The virus, which has since appeared in more than a dozen variants, exploits a flaw in a plug-and-play feature of Microsoft's operating system and causes infected machines to continually reboot, among other effects.

Security experts have called it the worst virus outbreak so far this year, although the rate of infections has been falling since late last week as more users patch their systems.

"It's definitely going down all the time," Mikko Hypponen, chief research officer at antivirus company F-Secure, says.

Low-Level Risk

Most Windows XP users have probably upgraded to Service Pack 2 by now, so the risk to XP machines is probably not very significant, he says. Still, there are now more than a dozen variants of Zotob, at least one of which is spreading via e-mail, which makes it easier for the virus to get behind corporate firewalls, Hypponen says. Users are advised to install the patch Microsoft issued two weeks ago and keep their antivirus definition files up to date.

Microsoft acknowledged in its original security bulletin that some Windows XP machines could be at risk, as well as systems running some versions of Windows Server 2003. But to exploit those operating systems a virus writer would need a valid user log-in, making those systems less vulnerable.

On Tuesday, Microsoft updated its guidance. For machines that are not joined to a network domain--which is likely the case with most home users--and where the Simple File Sharing Feature is enabled, other users can access those PCs using a "guest account," for which a log-in is not required. That means those systems have the same vulnerability that was exploited by Zotob.

F-Secure's Hypponen has written a personal account of the of the Zotob outbreak on the company's Web log.

Note: When you purchase something after clicking links in our articles, we may earn a small commission. Read our affiliate link policy for more details.
Related:
  
Shop Tech Products at Amazon