MIT Technology Review Subscribe

The JPEG of Death

Computer hackers have taken some pornographic JPEGs and augmented them with an exploit that uses the JPEG vulnerability that Microsoft recently announced, as reported by Computerworld. The exploit isn’t a virus, but instead turns the compromised computer into a bulk-mail…

Computer hackers have taken some pornographic JPEGs and augmented them with an exploit that uses the JPEG vulnerability that Microsoft recently announced, as reported by Computerworld. The exploit isn’t a virus, but instead turns the compromised computer into a bulk-mail spam machine, proof once again that the hackers and the spammers have teamed up.

What’s really neat about this exploit is that many people had long expected that the JPEG decompress routines, because of their complexity, almost certainly had to have some kind of buffer overflow in them. But it took literally years for someone to find it…

I went to Windows Update yesterday with a Windows 98 machine — a machine that Microsoft officially doesn’t support anymore. Nevertheless, Microsoft was more than happy to download the JPEG fix to me. Clearly, they are taking this one very seriously.

Once again, this is proof that every Windows machine being used to browse the Internet shoud have automatic updates on by default.

Advertisement
This story is only available to subscribers.

Don’t settle for half the story.
Get paywall-free access to technology news for the here and now.

Subscribe now Already a subscriber? Sign in
You’ve read all your free stories.

MIT Technology Review provides an intelligent and independent filter for the flood of information about technology.

Subscribe now Already a subscriber? Sign in
This is your last free story.
Sign in Subscribe now

Your daily newsletter about what’s up in emerging technology from MIT Technology Review.

Please, enter a valid email.
Privacy Policy
Submitting...
There was an error submitting the request.
Thanks for signing up!

Our most popular stories

Advertisement