"Sadie Network" Microsoft urgently released early last week to disclose the SMB (Server message Module) V2 security vulnerabilities to circumvent measures to mitigate the Vista or Windows Server 2008 products such as users of the risk of hacking attacks.
The patch, which Microsoft added to the security bulletin, is designed to provide users with a temporary defense against remote code execution using this known security vulnerability by turning off the SMBv2 feature and then stopping and enabling the server's services.
However, Microsoft warns that shutting down the SMBv2 feature may slow down SMB connections between Windows Vista and Windows Server 2008 machines.
Microsoft confirms that the code developed by the intrusion testing company immunity to exploit this vulnerability is really working. This code is valid for attacks implemented by 32-bit Windows Vista and Windows Server 2008 systems.
This code that exploits security vulnerabilities can fully control the target computer. No authorized user can launch this attack.
Microsoft says we encourage responsible disclosure of security vulnerabilities. We believe that this universally accepted approach to reporting security vulnerabilities is beneficial for vendors to provide the best service to their users.