Microsoft to fix URI security flaw after criticism

Microsoft Corp. plans to fix a bug in the Windows operating system that has been blamed for a handful of critical vulnerabilities in Windows software.

The flaw lies in the URI (Uniform Resource Identifier) handler technology that lets Windows users launch programs — e-mail or instant messaging clients, for example — through their browsers by clicking on specially crafted Web links.

In July, security researcher Thor Larholm showed how a browser could be tricked into sending malformed data to Firefox using this technology. This bug allowed an attacker to run unauthorized software on a victim’s PC.

Later, other researchers began exploring ways of misusing other programs to achieve similar results. To date, researchers have found ways to exploit this type of vulnerability in many products including Firefox, Outlook Express 6 and Adobe Reader 8.1.

The problem lies in the way the PC’s software “sanitizes” these links to make sure attackers cannot successfully insert malicious code into them. Its solution has been a matter of dispute. Some security experts have said that Windows could do a better job in checking the links to make sure they were not malicious; Microsoft had insisted that this was the job of the people who were writing the programs that were being launched.

The software vendor has now apparently reversed that position.

“Since we began investigating this situation in July there’s been more discussion on how to potentially use this in attacks,” wrote Microsoft’s Jonathan Ness in a Wednesday blog posting. “So to help address overall confusion between these two issues, we’ve released Security Advisory 94351 to alert customers to the risks associated with this issue, and to let folks know we’re working on a security update.”

The update will change a Windows function known as ShellExecute() so that it sanitized the links it is processing, he added. In addition to Ness’s blog posting, Microsoft has released a security advisory on the issue.

Microsoft’s public relations agency was not immediately able to answer questions relating to this issue Wednesday.

How far these changes will go to disable these types of bugs depends on how Microsoft implements its changes, but the software vendor will be unable to fix all these bugs, said Nathan McFeters, a security researcher with Ernst & Young Global Ltd. who has been researching the issue. That’s because the way these links are handled by the applications such as AOL Instant Messenger or Trillian is outside of Microsoft’s control.

For example, it would be impossible for Microsoft to fix a recent Picasa flaw discovered by McFeters and Researcher Billy Rios. “The Picasa flaw is based on the intended use of the application, we are just abusing this functionality,” McFeters wrote in an e-mail interview. ” Microsoft can’t fix the fact that the way these URI are used can cause flaws.”

Microsoft did not say when it planned to patch the URI protocol handling flaw. Its next set of security updates is due Nov. 13.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now