Attack code surfaces for latest Windows vulnerability

Computer code that exploits a critical new software vulnerability in the Windows XP and Windows 2000 operating systems is circulating on the Internet, according to security experts.

Two examples of “exploit” code for a buffer overrun in the Windows Workstation Service were posted to security-related Internet discussion groups on Friday and Saturday. Both exploits have been tested and work, according to Dan Ingevaldson, director of X-Force at Internet Security Systems Inc. (ISS).

The Workstation Service vulnerability was disclosed by Microsoft Corp. in Security Bulletin MS03-049, which was released on Nov. 11. The service is turned “on” by default in Windows 2000 and Windows XP systems and allows computers on a network to connect to file servers and network printers, Microsoft said.

Both the CERT Coordination Center at Carnegie Mellon University and ISS issued advisories last week regarding the Workstation vulnerability, warning that it was easy to exploit and well suited to use by self-spreading Internet worms.

One version of the exploit code is attributed to somebody using the online name “wirepair,” and was first published in a private online forum at Russian security site forum.securitylab.ru, Ingevaldson said. A second exploit, dated Nov. 14, appeared on the French language hacking Web site www.k-otik.net by someone using the online name “snooq.”

The two pieces of code are early attempts to exploit the MS03-049 vulnerability and contain multiple bugs that make them difficult to run. Because of flaws in the way the code authors attempt to trigger the buffer overrun in the Workstation Service, attackers have only one chance to compromise vulnerable Windows systems, which crash when the exploit is not successful, Ingevaldson said. Those faults make the code ill-suited to use in an Internet worm, he said.

“You need exploits that are robust and that work all the time to make an effective worm,” Ingevaldson said.

However, virus writers and hackers worldwide will work diligently to refine the exploit code, finding ways to get the code to stop crashing systems and work on all versions of Windows XP and Windows 2000, he said. Such a pattern of refinement preceded the release of the Blaster and Nachi worms in August, Ingevaldson said.

In addition, the two exploits that were publicly released might not be the only exploits for MS03-049 that have been created, he said. “(Exploits are) like cockroaches. If you see one or two, there are probably others as well,” Ingevaldson said.

ISS encourages Windows users to download and apply the software patch for the Workstation Service on Windows XP and 2000 machines as soon as possible, he said. (See www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/ms03-049.asp.)

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now