Windows SP2 security compromised

A security researcher claims to have crafted a simpler version of an exploit that could compromise a Microsoft Windows system patched with Service Pack 2.

The exploit, discussed in a Saturday message to the Bugtraq security mailing list, is based on an exploit first disclosed in late October. That exploit used two vulnerabilities in Internet Explorer 6, in combination with an inappropriate behavior in the ActiveX Data Objects model, to compromise an SP2-patched system.

The October vulnerability was itself a variant of a bug dating back to August. Both earlier flaws were ranked “highly critical” by Danish security firm Secunia, the second most serious of the company’s ratings.

The October exploit required a user to drag an image from one part of a Web page to another, and then to click a button. At the time, Microsoft Corp. said the bug required too much user interaction to be considered serious. The new version, discovered by the Greyhats Security Group, eliminates the step of clicking a button, the group said. Like the earlier exploit, the new attack could lead to the execution of HTML and script code in the context of a trusted site, Greyhats said.

The researcher posted a proof of concept demonstration which, when an image is moved from one part of a Web page to another, is designed to create a file on the user’s machine, bypassing the “Local Computer” zone lockdown security feature in SP2. Secunia said on Monday it had confirmed the exploit was effective against SP2-patched systems.

While no patch is available, users can protect themselves by disabling the “Drag and Drop or copy and paste files” option in Internet Explorer, according to Microsoft. Secunia said users could also set the security level for the “Internet” zone to “high” and disable active content.

A few vulnerabilities in SP2 have begun to surface. Earlier this month, Finjan Software Inc. claimed to have discovered a set of 10 major security flaws in SP2, bypassing many of the security measures the update puts into place and allowing the execution of malicious code on a system by luring the user to a specially crafted Web page.

However, the service pack has blocked some new attacks that are effective against earlier versions of Windows XP, for example the still-unpatched IFRAME vulnerability that allowed attackers to plant malicious code on PCs via a hacked banner ad server.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now