Microsoft warns of critical Windows flaw

Microsoft Corp. warned of a critical security flaw Wednesday that affects all supported versions of its Windows operating system and could enable a remote attacker to run malicious code on unpatched Windows systems.

The security hole is due to a buffer overrun vulnerability in the Windows HTML converter, a Windows component that enables Windows to convert files from Rich Text Format (RTF) to HTML, which is used to display documents on the Web.

The flaw exists in an HTML converter feature used to handle content that is cut and pasted within Windows. When properly exploited, the flaw could cause the converter to crash, enabling an attacker to deposit and run his or her own code on the affected system, Microsoft said.

Because the converter is also used by the Internet Explorer Web browser, malicious hackers could launch attacks by sending specially crafted e-mail messages to vulnerable systems or tricking users into visiting Web pages designed to exploit the vulnerability.

Once a user visited such a site or opened an e-mail, no further user interaction would be required to cause the buffer overrun, Microsoft said.

While the vulnerability was rated critical for most versions of the Windows operating system, the Redmond, Wash. company noted that attackers who successfully exploited the vulnerability would only gain the privilege level of the current user. For non-administrative users, that could limit the damage caused on exploited systems, Microsoft said.

In addition to its Security Bulletin, MS03-023, Microsoft issued patches for all affected systems up to and including the most recent Windows Server 2003 release. (See https://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS03-023.asp.)

Microsoft encouraged all affected customers to apply the appropriate patch at the earliest possible opportunity.

In addition to the HTML converter vulnerability, Microsoft issued patches for two other software flaws Wednesday, MS03-024 and MS03-025, both rated “Important” by the company.

Bulletin MS03-024 concerns a buffer overrun problem affecting the Server Message Block protocol on machines running Windows NT 4.0, 2000 and XP Professional. That problem, if left unpatched, could lead to the corruption of data stored on the system and enable an attacker to execute malicious code.

Bulletin MS03-025 concerns a flaw in Windows Utility Manager on systems running Windows 2000.

The Utility manager is used to monitor the status of some of Microsoft’s accessibility options for persons with disabilities. The vulnerability could enable a malicious user to perform actions on the system in excess of his or her privilege level, Microsoft said.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now