The primary focus of Microsoft .NET Framework 1.1 Service Pack 1 (SP1) is improved security. In addition, the service pack includes roll-ups of all reported customer issues found after the release of the Microsoft .NET Framework 1.1. Of particular note, SP1 provides better support for consuming WSDL documents, Data Execution prevention and protection from security issues such as buffer overruns. XP version, 2003 Server version.
“The primary focus of Microsoft .NET Framework 1.1 Service Pack 1 (SP1) is improved security.”
… and the correction of a huge pile of bugs. I’ve been using ASP.net for 3 months and it’s clearly not fully debugged. The most blattant example is the famous bug concerning javascript errors in generated pages (http://support.microsoft.com/default.aspx?scid=kb;EN-
US;818803). If you do anything harder than a hello world you’re quite sure to fall into this. It has been known for months, yet there was no patch available. “Wait for SP1” they said. A least today there is one thing that works in ASP.net (but how many things will this SP break?).
Could you post working link to this bug?
The line feed broke the link. This is the correct URL:
http://support.microsoft.com/default.aspx?scid=kb;EN-US;818803
The generated __doPostBack javascript function contains syntax errors (“:” instead of “_”). This function is called when submitting the page. It appears when you put controls inside an other control implementing INamingContainer (a lot of controls implement this interface).
For the moment, the only workaround was to try patching the generated stream on the fly. This is only one of the problems I came accross. And I’m not doing complex things. There is even a website dedicated to .net bugs http://www.error-bank.com
After they burned the .net (compact framework) in Pocket pc 2003 my small native c++(not .net) application runs/starts noticeably slow. Same task runs about 5 seconds faster in pocket pc 2002.
Recently played around with VB.net and c# and I can tell the .net framework is not mature yet but at present rate of bug fixes in about year and half it will be a good framework to write application for.
Hi
First the windows xp sp2 had a glaring vulnerability where everyone could spoof the security control center to give false information which MS said crackers wouldnt bother to exploit. now this. good work
‘To resolve this problem immediately, contact Microsoft Product Support Services to obtain the fix’ – it’s already been repaired.
” First the windows xp sp2 had a glaring vulnerability where everyone could spoof the security control center to give false information which MS said crackers wouldnt bother to exploit. now this. good work ”
Until I actually see an example of this I characterize that as a half baked attempt as FUD towards Windows. The WMI requires to much user interaction that bypasses what a virus can do. Non of the “exploits” that have been reported this month while may be design flaws cannot be executed by a virus, trojan or worm. They all need interaction to work. Everyone wanted to be the first to find a flaw and until I see an example of this flaw being exploited, I classify it as FUD.
Just wanted to add something to your comment…
All hotfixes related to development products (languages, .net, SQL Server, etc) require a phone call to PSS. This is in stark contrast to Windows/Exchange/other server related products whereby you can normally download the hotfix straight from the support site. In both cases, the hotfix is free. Regardless, this issue has been patched for quite some time now (as you pointed out). SP1 is nothing more than a rollup with some security stuff thrown in as well. cheers.
the windows xp sp2 had a glaring vulnerability where everyone could spoof the security control center to give false information
The concept of spoofing control centre is the same as the concept of rootkit.
Ever heard about rootkits for Linux? Please investigate the subject and go spam Linux news with the descriptions of a glaring vulnerability in Linux where everyone could spoof the standard UNIX/Linux commands to give false information, to hide presence of malware.
Anyone know if there is one?
Read the system requirement detail — the xp update also works on win2000.