Windows open to 2 more attacks

Hackers have given system administrators two more reasons to update users’ Windows PCs. Over the past two days, they have published two more samples of software that could be used to attack an unpatched Windows system, bringing the tally of new Windows attacks released into circulation this week to four.

The latest examples, posted to the French Security Incident Response Team (FrSIRT) Web site on Wednesday (http://www.frsirt.com/exploits/20051130.MS05-053.c.php) and Thursday (http://www.frsirt.com/exploits/20051201.MS05-051msdtc.cpp.php), take advantage of the same two flaws that were exploited earlier in the week.

One of these attacks exploits a critical vulnerability in the way that Windows processes files saved in the Windows Metafile graphics format, and it can be used to crash a system. Microsoft fixed this Metafile bug in its MS05-053 Security Update, released Nov. 8, (http://www.microsoft.com/technet/security/bulletin/MS05-053.mspx) so customers who have not yet applied this patch are the only ones at risk from this new attack.

The second attack targets a flaw in the Microsoft Distributed Transaction Coordinator (MSDTC), which was patched in October’s MS05-051 Security Update (http://www.microsoft.com/technet/security/bulletin/MS05-051.mspx). MSDTC is a component of the operating system that is commonly used by database software to help manage transactions.

This code appears to be an update to some earlier attack code, which was extremely buggy, according to David Marcus, security research and communications manager with McAfee Inc. “The first exploit [the hacker] did of that code, it only worked on a bizarre Russian build of Windows 2000,” he said. “The second revision seems to be a bit more stable.”

However, McAfee is most concerned over another type of attack, which was first disclosed on Nov. 21. This attack takes advantage of an unpatched flaw in the way Internet Explorer (IE) handles the JavaScript language, and it could be used to take over a victim’s PC.

“We definitely see that one as a problem, and that’s definitely causing a lot of chatter,” Marcus said. “The underground is latching on to this thing and they’re figuring out some way to turn this into a worm candidate.”

Most security experts expect Microsoft to patch this IE flaw by the time it releases its next security update on Dec. 13. To make things easier for systems administrators, Microsoft normally releases security patches on the second Tuesday of every month, but Marcus believes that the publicity surrounding the matter may prompt Microsoft to act sooner.

“I think for their own good public relations, they’ll eventually release a patch out of cycle,” he said. “They’re getting too much publicity.”

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now