So I’ve been into the bank a few times this week and have noticed they are still running XP on their workstations.
The ‘SecuriTeam‘ guys have put together a tally of most critical vulnerabilities associated with Microsoft Windows XP, it totals in at 358 vulnerabilities! I am intrigued as to how they are protecting themselves and their customers. Here’s a list of the top 100, but check out their site for a full list;
- Microsoft Internet Explorer Property Change Memory Corruption Vulnerability
- Microsoft Internet Explorer mshtml.dll Dangling Pointer Vulnerability
- Microsoft Windows Shell Graphics BMP height Integer Overflow Vulnerability
- Microsoft Windows Shell Graphics BMP width Integer Overflow Vulnerability
- Microsoft Windows Shell Graphics biCompression Buffer Overflow Vulnerability
- Microsoft Internet Explorer Animation Use-after-free Vulnerability
- Microsoft Windows WmiTraceMessageVa Kernel Vulnerability
- Microsoft Windows OpenType CFF Parsing Vulnerability
- Wireshark 1.4.0 Malformed SNMP V1 Packet Denial of Service Vulnerability
- Microsoft Word 2003 MSO Null Pointer Dereference Vulnerability
- Microsoft Windows CreateWindow function callback vulnerability
- Microsoft Windows MPEG Layer-3 Audio Decoder Code Execution Vulnerability
- Microsoft Windows Help and Support Center Code Execution Vulnerability
- Apple WebKit innerHTML element Substitution Remote Code Execution Vulnerability
- Google Chrome and Safari WebKit HTML Caption Use After Free Vulnerability
- Microsoft Windows Kernel GetDCEx() Memory Corruption Vulnerability
- Windows SMTP Service DNS Query ID Vulnerabilities
- Microsoft Windows Outlook Express and Windows Mail Integer Overflow Vulnerability
- Oracle Java Runtime Environment Image File Buffer Overflow Vulnerability
- Microsoft Windows Movie Maker and Microsoft Producer IsValidWMToolsStream() Heap Overflow
- Microsoft Windows URL Handling Vulnerability
- Microsoft Windows SMB NTLM Authentication Weak Nonce Vulnerability
- Microsoft SMB Client Pool Overflow Vulnerability
- Microsoft Windows RLE Video Decompressor Remote Code Execution Vulnerability
- Microsoft Windows ShellExecute Improper Sanitization Code Execution Vulnerability
- Microsoft Internet Explorer Dynamic OBJECT Tag and URLMON Sniffing Vulnerabilities
- Microsoft Indeo Codec Memory Corruption Vulnerability
- Microsoft Windows Local Security Authority Integer Overflow Vulnerability
- Windows Kernel Multiple Vulnerabilities
- Microsoft Windows ActiveX Indexing Service Memory Corruption Vulnerability
- Windows CryptoAPI Null Truncation and Integer Overflow Vulnerabilities
- Microsoft .NET Common Language Runtime Multiple Vulnereabilities
- ActiveX Active Template Library Initialization Vulnerability
- Windows Media Runtime Remote Code Execution
- Microsoft Windows XP/Vista TCP/IP Orphaned Connections Vulnerability
- Microsoft Windows MSMQ Privilege Escalation Vulnerability
- Microsoft Workstation Service Heap Corruption Vulnerability
- Microsoft Embedded OpenType Font Engine Heap Buffer Overflow (MS09-029)
- Microsoft DirectShow QuickTime Atom Parsing Memory Corruption Vulnerability (MS09-028)
- LogRover SQL Injection Authentication Bypass
- Microsoft Internet Explorer Security Zone Restrictions Bypass
- Microsoft Windows Graphics Device Interface Integer Overflow Vulnerability (MS08-071)
- Vulnerability in SMB Allows Code Execution (MS08-068)
- Vulnerability in Server Service Allows Code Execution (MS08-067)
- Vulnerability in Windows Media Encoder 9 Allows Code Execution (MS08-053)
- Vulnerabilities in GDI+ Allow Code Execution (MS08-052)
- Vulnerability in Windows Media Player Allows Code Execution (MS08-054)
- Cumulative Security Update for Internet Explorer (MS08-045)
- Microsoft Windows Color Management Module Heap Buffer Overflow Vulnerability (MS08-046)
- Vulnerabilities in DNS Allows Spoofing (MS08-037)
- Vulnerabilities in Pragmatic General Multicast (PGM) Allows Denial of Service (MS08-036)
- Vulnerability in Active Directory Allows Denial of Service (MS08-035)
- Cumulative Security Update of ActiveX Kill Bits (MS08-032)
- Vulnerability in Bluetooth Stack Allows Code Execution (MS08-030)
- Vulnerability in Microsoft Jet Database Engine Allows Code Execution (MS08-028)
- Microsoft Windows I2O Filter Utility Driver (i2omgmt.sys) Local Privilege Escalation Vulnerability
- Microsoft Windows Graphics Rendering Engine Multiple Vulnerabilities (MS08-021)
- Microsoft GDI WMF Parsing Heap Overflow Vulnerability (MS08-021)
- Vulnerability in Windows Kernel Allows Elevation of Privilege (MS08-025)
- Security Update of ActiveX Kill Bits (MS08-023)
- Vulnerability in VBScript and JScript Scripting Engines Allows Code Execution (MS08-022)
- Vulnerabilities in GDI Allows Code Execution (MS08-021)
- Vulnerability in DNS Client Allows Spoofing (MS08-020)
- Microsoft Outlook mailto Command Line Switch Injection
- Adobe Reader and Acrobat JavaScript Insecure Method Exposure Vulnerability
- Adobe Reader Security Provider Unsafe Libary Path Vulnerability
- Adobe Reader and Acrobat Multiple Stack-based Buffer Overflow Vulnerabilities
- Vulnerabilities in Windows TCP/IP Allows Code Execution (MS08-001)
- Vulnerability in Message Queuing Allows Code Execution (MS07-065)
- Vulnerability in Macrovision Driver Allows Local Elevation of Privilege (MS07-067)
- Cumulative Security Update for Internet Explorer (MS07-069)
- Vulnerability in Windows URI Handling Could Allow Remote Code Execution (MS07-061)
- Security Update for Outlook Express and Windows Mail (MS07-056)
- Cumulative Security Update for Internet Explorer (MS07-057)
- Vulnerability in RPC Allows Denial of Service (MS07-058)
- Vulnerability in Kodak Image Viewer Allows Code Execution (MS07-055)
- Vulnerability in Windows Services for UNIX Allows Elevation of Privilege (MS07-053)
- Vulnerability in MSN Messenger and Windows Live Messenger Allows Code Execution (MS07-054)
- Vulnerabilities in Windows Media Player Allows Code Execution (MS07-047)
- Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution (MS07-042)
- Vulnerability in OLE Automation Allows Code Execution (MS07-043)
- Vulnerability in GDI Allows Code Execution (MS07-046)
- Microsoft XML Core Services XMLDOM Memory Corruption Vulnerability
- LinkedIn Toolbar (Exploit)
- Vulnerability in Microsoft Internet Information Services Allows Code Execution (MS07-041)
- Vulnerability in Win 32 API Allows Code Execution (MS07-035)
- Cumulative Security Update for Outlook Express and Windows Mail (MS07-034)
- Vulnerability in the Windows Schannel Security Package Allows Code Execution (MS07-031)
- Microsoft GDI+ Integer Division by Zero Flaw Handling .ICO Files
- Cumulative Security Update for Internet Explorer (MS07-027)
- McAfee Security Center IsOldAppInstalled ActiveX Buffer Overflow Vulnerability
- Windows Kernel Elevation of Privilege (MS07-022)
- Universal Plug and Play Remote Code Execution (MS07-019)
- Microsoft Agent Remote Code Execution (MS07-020)
- CSRSS Remote Code Execution (MS07-021)
- Universal Plug and Play Remote Code Execution (MS07-019)
- Enterasys Networks Multiple NetSight Products Multiple Vulnerabilities
- AOL Nullsoft Winamp IT Module Heap Memory Corruption (IN_MOD.DLL)
- Vulnerabilities in GDI Allows Code Execution (MS07-017)
- Windows Animated Cursor Stack Overflow Vulnerability (0-Day)
http://www.securiteam.com/products/W/Windows_XP.html