In news:RC6Va.40162$Kb2.1694869@news010.worldonline.dk, Anders Houmark
<anders@andersh.fjerndette.dk> wrote:
> Dette er bare et skud i tågen, men det kunne være at der var noget
> galt med DirectX 9.0A.. Den er nemlig kommet i en 9.0B.. Det er da et
> forsøg værd :)
Det eneste DirectX 9.0b retter er et sikkerhedshul i Directshow delen af
DirectX.
***CUT START***
In earlier versions of DirectX, there is a security issue in DirectShow.
This vulnerability allows an attacker to execute code on a user's system.
Microsoft has fixed that issue in DirectX 9.0b.
This is a buffer overrun vulnerability. An attacker who successfully
exploited the vulnerability could, in the worst case, run code of his or her
choice on a user's system. The attacker's code would run with the same
privileges as the user: any restrictions on the user's ability to change the
system would apply to the attacker's code.
There are two ways to obtain that fix, either you download a small download
package which fixes the security issue in DirectShow or you can download the
whole DirectX 9.0b End-user runtime package. In both cases, your DirectX
version will be updated to 9.0b and build number will be updated to
4.90.00.0902.
The only difference is that DirectX 9.0b can not be uninstalled while
DirectX 9.0a patch can be uninstalled if you want to restore your previous
version of DirectX.
DirectX 9.0b requires Windows Server 2003 (all versions except Windows
Server 2003 64-bit editions), Windows XP (all versions except Windows XP
64-bit editions), Windows 2000 Service Pack 3 (SP3), Windows 2000 Service
Pack 4 (SP4), or Microsoft Windows Millennium Edition. The Microsoft Windows
2000 version of the security patch is included in Windows 2000 Service Pack
4 (SP4).
*** CUT END***
Jeg tvivler på at opgradering til 9.0b vil hjælpe på problemer med at PC'en
stener, men det er nok en god idé fra et sikkerhedsstandpunkt.
--
Mvh, Karsten.
http://www.vinding.adsl.dk