Vulnerability with svchost.exe allowed

There is a service in winXP called “Background Intelligent Transfer Service” It is started by default, its documented in MSDN and it can be used for transfering files by anyone without being spoted by Firewall, if your firewall settings allow system process svchost.exe on port 80.

BITS are only needed for Windows Update, else you’ll just disable it(and Automatic Updates).
That solves the problem!

Ragwing

Hello MistWeaver
,
This is a “possible” leak. This was looked at, and was reported to be protected by earlier builds of Comodo

"Comodo now passes the BITS leak test. (I think the only firewall to pass this leak test fresh out of box)
There was a long disgussion of this at wilders http://www.wilderssecurity.com/showthread.php?p=782999#post782999 [i] Edit: to show link[/i]
BITS are only needed for Windows Update, else you'll just disable it(and Automatic Updates). That solves the problem!

BITS service is enabled by default. Thats why I created this thread.

This is a "possible" leak. This was looked at, and was reported to be protected by earlier builds of Comodo

If svchost is allowed and BITS is on, my CPF (2.4.18.184) doest respond to malware application acting.

Hello Ragwing,

Only if you where to leave the bits service disabled forever. Jobs for bits are placed on a “que” and will wait for the service to start. Only if the commands for this are intercepted and blocked could protection be in place.

You should be warned of the “Job” being placed (A popup to show this action)

Edit,
I will look at this again, but think you are OK.

How to disable this BITS.

Open start menu, click ‘Run’ and write ‘services.msc’.
It’ll show a list of the services installed.
Now find Background Intelligent Transfer Service(BITS) and double-click it.
Then in the dropdown-box choose ‘Disabled’ and then close the properties by clicking ‘Ok’.

Ragwing

Thank you Ragwing. :slight_smile: