DSO Exploit?

Discussion in 'other software & services' started by Cochise, Jul 3, 2004.

Thread Status:
Not open for further replies.
  1. Cochise

    Cochise A missed friend

    Joined:
    Jan 26, 2003
    Posts:
    2,549
    Location:
    North Thoresby Lincs Good Olde England
    I can run Spybot S&D one after another and each time I get a DSO Exploit - 5 Entries come up:- HKEY-USERS\S-1-5-18 to 21\MicrosoftWind. Registry Change. I 'FIX' it but it's still there on the next run??....Whats that all about please..

    Cochise, :cool:
     
  2. LowWaterMark

    LowWaterMark Administrator

    Joined:
    Aug 10, 2002
    Posts:
    18,280
    Location:
    New England
    That's just a bug in Spybot 1.3. They know about it and have fixed the code, but have not yet released an update to the public. See this thread for more on this:

    https://www.wilderssecurity.com/showthread.php?t=32387

    You can either look at manually updating the registry entries that Spybot is scanning, or just ignore it until Spybot gets updated to handle it itself.
     
  3. Cochise

    Cochise A missed friend

    Joined:
    Jan 26, 2003
    Posts:
    2,549
    Location:
    North Thoresby Lincs Good Olde England
    Many thanks LWM....no sweat then, I'll wait for the Update......Good health!

    Cheers, Cochise, :cool:
     
  4. Mr. Hrmm

    Mr. Hrmm Guest

  5. nadirah

    nadirah Registered Member

    Joined:
    Oct 14, 2003
    Posts:
    3,647
    Spybot S&D is just giving false positives on this thing, in fact the vulnerability does NOT even exist as shown here by DSOStop2:
     

    Attached Files:

    • DSO.JPG
      DSO.JPG
      File size:
      14 KB
      Views:
      341
  6. Mr. Hrmm

    Mr. Hrmm Guest

    Spybot didn't even find it on my computer.
    But DSOStop2 said I had the vulnerability.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.