News
3/24/2014
11:41 AM
Connect Directly
RSS
E-Mail
50%
50%

Windows XP: Feds Brace For End Of Support

Roughly one in 10 U.S. government PCs still use Windows XP. They will be more vulnerable to attacks when XP support ends on April 8

As Microsoft's April 8 deadline approaches for ending support of its Windows XP operating system, one of its largest group of users, the federal government, appears behind schedule in making the transition to new operating systems, leaving an estimated 10% of federal desktop computers more vulnerable to attacks. After that date, government computers using the operating system will continue to function, but they will become "five times more vulnerable to security risks and viruses," even if anti-virus software is in place, Microsoft said on its website.

Since 2007, when Microsoft announced its intentions to stop supporting XP, the company has worked with the federal government to check its progress, eventually on a monthly basis, and identify issues that may cause a delay in deployments of newer operating systems. Most agencies have moved from XP to the latest versions of Windows, and more than 90% of them are expected to have made the transition by April, Susie Adams, chief technology officer for Microsoft Federal, said in an email to InformationWeek. That's better than the market at large: As of last month, more than 29% of the desktop market, or roughly a half-a-billion active users worldwide, still use XP, according to Web-tracking firm Net Applications.

Read the full article here.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
DevOps’ Impact on Application Security
DevOps’ Impact on Application Security
Managing the interdependency between software and infrastructure is a thorny challenge. Often, it’s a “developers are from Mars, systems engineers are from Venus” situation.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7392
Published: 2014-07-22
Gitlist allows remote attackers to execute arbitrary commands via shell metacharacters in a file name to Source/.

CVE-2014-2385
Published: 2014-07-22
Multiple cross-site scripting (XSS) vulnerabilities in the web UI in Sophos Anti-Virus for Linux before 9.6.1 allow local users to inject arbitrary web script or HTML via the (1) newListList:ExcludeFileOnExpression, (2) newListList:ExcludeFilesystems, or (3) newListList:ExcludeMountPaths parameter t...

CVE-2014-4326
Published: 2014-07-22
Elasticsearch Logstash 1.0.14 through 1.4.x before 1.4.2 allows remote attackers to execute arbitrary commands via a crafted event in (1) zabbix.rb or (2) nagios_nsca.rb in outputs/.

CVE-2014-4511
Published: 2014-07-22
Gitlist before 0.5.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the file name in the URI of a request for a (1) blame, (2) file, or (3) stats page, as demonstrated by requests to blame/master/, master/, and stats/master/.

CVE-2014-4911
Published: 2014-07-22
The ssl_decrypt_buf function in library/ssl_tls.c in PolarSSL before 1.2.11 and 1.3.x before 1.3.8 allows remote attackers to cause a denial of service (crash) via vectors related to the GCM ciphersuites, as demonstrated using the Codenomicon Defensics toolkit.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Where do information security startups come from? More important, how can I tell a good one from a flash in the pan? Learn how to separate ITSec wheat from chaff in this episode.