December 18, 2003, 4:46 PM — Software developers can now test drive the latest update to Microsoft Corp.'s Windows XP operating system after the company released a beta version of Windows XP Service Pack 2 (SP2) to testers in its MSDN developer program on Wednesday.
The company released the advance copy of XP SP2 to give IT professionals a chance to test and give feedback on new features and configuration changes in SP2. Many of those changes were introduced to make computers running XP less susceptible to viruses and worms such as the recent Blaster, Microsoft said.
In a statement on the company's Web page, Microsoft called the XP SP2 beta version release a "milestone" in its effort to make XP and its customers more secure. The features released Wednesday are a "subset" of those that will be included in the final release of SP2. Beta testers feedback will help Microsoft determine which features to include and omit, the company said. (See: http://www.microsoft.com/presspass/newsroom/winxp/WindowsXPSPFS.asp.)
Among the changes in the operating system is an improved version of firewall software that ships with XP. Formerly known as the Internet Connection Firewall, that software is now called the Windows Firewall and is turned on by default, blocking Windows communications ports that are not being used by software applications installed on an XP machine, Microsoft said.
Beta testing will ensure the Windows Firewall does not disrupt software applications running on Windows when SP2 ships to customers, Microsoft said.
Microsoft also turned off a controversial administrative tool called Windows Messenger service, which allowed computers on a network to display text messages in pop-up desktop windows. That feature had long-ago been discovered by spammers and used to display a advertisements and had recently been the subject of a critical security patch from Microsoft.
Other security changes in XP SP2 are more subtle.
Microsoft changed Windows implementation of RPC (Remote Procedure Call) that will make it harder for attackers to exploit that service. Recent worms such as Blaster and Nachi used a security vulnerability in RPC to infect Windows machines.
The company also locked down the Component Object Model (COM) that governs the way software applications run in the Windows environment and exchange information over a computer network. Security holes in a component of COM called the Distributed Component Object Model (DCOM) were behind the Blaster and Nachi Internet worms earlier this year.
Changes in the software used to compile Windows XP's underlying computer code has also made the operating system less vulnerable to buffer overrun attacks, which are flaws in underlying software code that can allow hackers to crash Windows or take control of vulnerable systems, Microsoft said.