A recently revealed Windows vulnerability was downplayed by Microsoft and said that the bug could not be used to compromise a computer. A person identified only as Cupidon-3005 disclosed the flaw found in the Windows Server Message Block network and file sharing protocol.
Danish and French researchers said that hackers could use to control Windows computers. Microsoft challenged them, saying that the vulnerability can’t be used for remote code execution on 32-bit systems. The company added that they are still investigating whether 64-bit systems are vulnerable but as of press time they haven’t found any likely scenario that points in that direction.
If ever the attack on the SMB is successful, it would only result in a denial of service. The Windows computer will crash into the blue screen of death that would require the PC to reboot. Other security experts state that it would be impossible for a remote code execution on a 32-bit Windows system because of memory limitation. But it is possible on a 64-bit system if there is more than 8GB of memory available.
Microsoft is not likely to issue an emergency patch and would probably issue a fix for the vulnerability on the regularly scheduled patch release.