S-229: Windows Vista Vulnerability


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) S-229: Windows Vista Vulnerability
# 1  
Old 03-27-2008
S-229: Windows Vista Vulnerability

Windows Vista fails to properly handle the NoDriveTypeAutoRun registry value, which may prevent Vista from effectively disabling AutoRun and AutoPlay features. The risk is MEDIUM. Windows VIsta may have some AutoPlay enabled, even though the Group Policy Editor and associated registry values indicate otherwise. This may allow an attacker to cause a user to inadvertently execute arbitrary code on a removable device, such as a USB drive.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread
Login or Register to Ask a Question
vcatobj(1Vi)															      vcatobj(1Vi)

NAME
vcatobj - concatenate Vista data files SYNOPSIS
vcatobj [-option ...] [infile ...] [> outfile] DESCRIPTION
vcatobj copies the contents of one or more input files to an output file. All objects found in all input files (such as images, edge lists, and comments) are copied, in order, to the single output file. COMMAND LINE OPTIONS
vcatobj accepts the following options: -help Prints a message describing options. -in infile ... Specifies one or Vista data files to be input. -out outfile Specifies where to write the output as a Vista data file. Input files can be specified on the command line or allowed to default to the standard input stream. The output file can be specified by the -out option or allowed to default to the standard output stream. SEE ALSO
vcatbands(1Vi), Vista(7Vi) NOTES
All input files are read before the output file is written. The program vcatobj was originally be known as vcat, created by Art Pope. AUTHOR
Art Pope <pope@cs.ubc.ca> Vista Version 1.12 24 April 1993 vcatobj(1Vi)