Exploits on the loose for latest Microsoft bugs

Just days after the release of Microsoft Corp.’s latest security patches, security researchers have begun publishing software that could be used to seize control of unpatched Windows computers.

Microsoft released a total of six patches Tuesday as part of its monthly security bulletin. Of the three critical flaws that were fixed, security experts are particularly concerned with one that affects the Windows Plug and Play system.

A total of three exploits for this vulnerability have now been published on the Fr-SIRT (French Security Incident Response Team) Web site, and while Microsoft is not aware of any attacks that use this code, Windows 2000 systems that have not been updated with Microsoft’s latest patches are at “great risk,” according to Marc Maiffret, chief hacking officer at eEye Digital Security Inc.

A researcher who works for the company that first reported the vulnerability to Microsoft believes it is only a matter of time before attackers exploit it. “There are so many instances of exploit code out there, it’s very easy to just drag and drop this worm into any of the virus-making toolkits and create your own custom attack,” said Gunter Ollmann, Director of Internet Security System Inc.’s X-Force research team.

Although the plug and play vulnerability, outlined in Microsoft security bulleting MS05-39, (http://www.microsoft.com/technet/security/Bulletin/MS05-039.mspx) is now easily exploited on Windows 2000, an attacker would need to have a valid login to the system to take advantage of it on Windows XP or Windows Server 2003, Ollmann said.

Exploit code has also been published for a critical flaw in Internet Explorer (IE) and a less serious bug in Microsoft’s Remote Desktop Protocol, (RDP) both of which were patched on Tuesday.

The IE exploits would allow attackers to gain control of an unpatched system, while the RDP exploit simply crashes the affected system, Maiffret said. “If you have RDP open to the outside world, there’s the potential that somebody can (launch a) denial of service,” he said, “but you’re not executing code.”

In a statement published Thursday, Microsoft said it was “disappointed” that security researchers had decided to release vulnerability code so close to the monthly patch releases.

Adding to Microsoft’s disappointment was the fact that the Internet Explorer patch was released late for some users. The company released a corrupted version of its MS05-038 (http://www.microsoft.com/technet/security/Bulletin/MS05-038.mspx) patch on Tuesday, which meant that users who picked up the patch from Microsoft’s Download Center within the first few hours of its 10:00 a.m. Pacific release on Tuesday were unable to install the software.

Microsoft pulled that patch from Download Center on Tuesday and had a working version available the next day. Software on Windows Update, Microsoft Update and the Windows catalog was unaffected by the glitch, Microsoft said.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now