Security researchers believe they have discovered a weakness in the new security given to Windows XP by the recently unveiled Service Pack 2 (SP2).
Since XP SP2 was released, activists have been searching for weaknesses in the security-focused service pack. Microsoft yesterday dismissed claims by German researchers to already have discovered a flaw.
Now a group has claimed that exploit code could bypass the new security procedures in XP by using the 'drag and drop' features of Internet Explorer.
In an advisory, consultant Secunia said researchers http-equiv had demonstrated that "the vulnerability is caused due to insufficient validation of drag-and-drop events issued from the 'Internet' zone to local resources.
"This can be exploited by a malicious website to e.g. plant an arbitrary executable file in a user's startup folder, which will get executed the next time Windows starts up."
But Microsoft believes that any hacker looking to exploit this issue would have to rely on considerable help from users.
The company said an attacker would need to first entice the user to visit a specific website and then entice them to drag and drop the malicious file in a specific location within that website.
"Given the significant amount of user action required to execute an attack, Microsoft does not consider this to be a high risk for customers," the firm said in a statement.
"Microsoft is not aware of any customer impact at this time. However, we will continue to investigate the issue to determine the appropriate course of action to protect our customers."
But Secunia argued that the flaw is "highly critical", as much of the work the user needs to follow could be masked into a single click.
"Even though the 'proof of concept' depends on the user performing a drag-and-drop event, it may potentially be rewritten to use a single click as user interaction instead," the consultant warned.
Meanwhile, Microsoft has published the first 'hotfix' for XP following the release of SP2, to deal with a loopback addressing problem.
A loopback address is a special internet protocol (IP) number (127.0.0.1) designated for the software loopback interface of a machine.
It allows IT professionals to test IP software without worrying about broken or corrupted drivers or hardware.
Microsoft is working towards a better patch for the problem, which showed up in Release Candidate versions of SP2.
Cotton seedling freezes to death as Chang'e-4 shuts down for the Moon's 14-day lunar night
Fortnite easily out-earns PUBG, Assassin's Creed Odyssey and Red Dead Redemption 2 in 2018
Meteor showers as a service will be visible for about 100 kilometres in all directions
Saturn's rings only formed in the past 100 million years, suggests analysis of Cassini space probe data
New findings contradict conventional belief that Saturn's rings were formed along with the planet about 4.5 billion years ago