Microsoft downplayed the threat posed to Windows users by a recently-revealed vulnerability, saying that it was unlikely the bug could be exploited to compromise a computer.
The flaw in the Windows Server Message Block (SMB) network and file-sharing protocol was disclosed Monday by someone identified only as " Cupidon-3005" on the Full Disclosure security mailing list. Cupidon-3005 posted proof-of-concept code to the list.
French and Danish researchers later said hackers might be able to exploit the bug to hijack Windows PCs. (See also "25 Years: Windows' Worst Moments")
Last week, Microsoft said that wasn't so.
"Based on our initial investigation this vulnerability cannot be leveraged for remote code execution (RCE) on 32-bit platforms," said Jerry Bryant, a general manager in the Microsoft Security Response Center (MSRC). "We are still investigating the possibility of code execution on 64-bit platforms, but so far have not found a likely scenario that would result in reliable code execution."
A successful attack that exploits the SMB bug would instead result in a "denial of service," said Bryant, using the term that describes a Window crash that would require rebooting the PC. Windows crashes often inform users of the dire situation with the infamous "Blue Screen of Death."
In a explanatory blog post , MSRC engineer Mark Wodrich echoed Bryant's take on the likelihood of remote code execution, saying that it was impossible on a 32-bit version of Windows due to memory limitations, and feasible on 64-bit Windows only if more than 8GB of memory was present.