missing Microsoft Windows update raises security concerns
Microsoft has released its security updates for the month of September, but a couple of unpatched flaws have some security experts wondering if the software company will be forced to release an emergency patch sometime in the month ahead.
Security researchers believe that an unpatched flaw in the SMB (Server Message Block) 2 software that ships with Windows Vista and Windows Server 2008 could turn into a major headache.
Proof of concept code showing how the bug could be leveraged to crash a Windows machine was posted Monday to the Full Disclosure mailing list by Laurent Gaffie.
But security experts believe that more serious attacks are possible.
Kostya Korchinsky, a senior security researcher with security-assessment software vendor Immunity, said the flaw could be exploited in a privilege-escalation attack. This type of attack is used once the attacker has already found a way to run software on the victim's machine. It gives the hacker a way of accessing system resources that would otherwise be prohibited.
A more dangerous "remote-code execution" attack "might be possible, but it would be a lot more difficult," Korchinsky said. With remote-code execution, the attacker is able to run unauthorized software on the victim's machine.
Security vendor SourceFire is examining the bug too. "We're unwilling to call it a DoS-only, but we're not willing to call it a remote-code-execution [flaw] either," said Matt Watchinski, the company's senior director of vulnerability research, referring to a denial of service attack.
SMB 2 is typically blocked at the firewall, so even if these attacks could be written, they would have a hard time spreading from company to company.
Gaffie said the flaw most likely works on Windows 7, Windows Vista, and Windows Server 2008. Earlier versions of Windows do not use SMB 2 and are thought to be immune.
Meanwhile, Microsoft has yet to patch a flaw in its Internet Information Services (IIS) software that was disclosed last week. That bug could let an attacker crash an IIS server, or even install unauthorized software in certain configurations.
The flaw could be used in a remote-code execution attack, but only in very specific circumstances. For the attack to work, the victim must run the older IIS 5 software on Windows 2000 and allow the attacker to create an ftp directory on the server.
Although Microsoft says it's seen a "limited number" of attacks that leverage this bug, Watchinski said it's unlikely to affect most IIS users.
Microsoft issued five security patches Tuesday, fixing eight vulnerabilities in Windows.
No responsibility can be taken for the content of external Internet sites.
Return to hosting news headlines
View Hosting News Archive