Microsoft fixes a security bug in its virus-scanner

Microsoft Corp. has patched a bug in its malware scanning engine that could be used as a stepping stone for an attacker looking to seize control of a Windows box.

The bug is fixed in an update to the Microsoft Malware Protection Engine that was pushed out to users of Microsoft’s security products on Wednesday. It’s what’s known as an elevation of privilege vulnerability — something that could be used by an attacker who already has access to the Windows system to gain complete administrative control.

Microsoft hasn’t seen anyone take advantage of the bug yet — the flaw was reported to the company by security researcher Cesar Cerrudo — but Microsoft thinks that hackers could develop code that reliably exploits the issue. 

In an instant message interview, Cerrudo, the CEO of security research firm Argeniss, said hedisclosed the bug publicly at the Black Hat security conference in July 2010. But because the hacker would already need have access to the machine to pull off this attack, he doesn’t believe that it presents a major security risk to most users. 

“This vulnerability could be exploited remotely, for instance on Internet Information Server, but the attacker will need to be able to upload an execute code on IIS,” he said. “Sites that allow users to upload Web pages, they are more at risk.”

Microsoft rates the issue as “important.”

An attacker could take advantage of the flaw by changing a Windows registry key to a special value, which would then be processed by the malware engine at its next scan.

This would be useful if the criminal was already on a machine that had locked-down user privileges. “An attacker who successfully exploited this vulnerability could execute arbitrary code… and take complete control of the system,” Microsoft said in a security advisory, released Wednesday. “An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.”

The issue is fixed in Version 1.1.6603.0 of the Malware Protection Engine, which is used in Windows Live OneCare, Microsoft Security Essentials, Windows Defender, Forefront Client Security, Forefront Endpoint Protection 2010, and the Microsoft Malicious Software Removal Tool.

Consumers should get the fix automatically as part of Microsoft’s monthly update to its malware scanner.

This isn’t the first time that Microsoft has found bugs in its security software. It reported bugs in the Malware Protection Engine back in 2007 and 2008.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now