Skip the navigation

Update: Microsoft reports three 'critical' Windows security flaws

Security researchers warn of a possible worm outbreak

By Robert McMillan
October 11, 2005 12:00 PM ET

IDG News Service - Microsoft Corp. has released nine security updates for vulnerabilities in its software products, including three critical fixes for Windows and Internet Explorer. Among the updates is a patch for bugs in two separate components of the Windows operating system that security researchers believe could be exploited by attackers in much the same way the Zotob family of worms was used two months ago.

The software patches, called updates in Microsoft parlance, were released today as part of the company's monthly security software release. Two of the critical updates concern Internet Explorer and Microsoft's DirectShow media streaming software. A third update, described in Microsoft Security Bulletin MS05-051, concerns the COM+ services included with Windows as well as the Microsoft Distributed Transaction Coordinator (MSDTC), a component of the operating system that's commonly used by database software to help manage transactions.

It is these last two vulnerabilities that have security researchers concerned because of their similarity to the Windows Plug and Play (PnP) system vulnerability reported in August. Within a week of its disclosure, that flaw was exploited by the authors of the Zotob worm. Variations of this attack eventually knocked hundreds of thousands of machines off-line, primarily affecting Windows 2000 users.

Microsoft has rated the MSDTC vulnerability as "critical" for users of Windows 2000, meaning it could be used by attackers to seize control of any unpatched system. The COM+ bug is rated critical for Windows 2000 and Windows XP, Service Pack 1.

Security researchers say that another Zotob-style worm outbreak is now a possibility. "The COM+ and MSDTC vulnerabilities have a very similar appearance to the PnP vulnerability that caused Zotob," said Mike Murray, director of vulnerability and exposure research for security vendor nCircle Network Security, Inc.

Internet Security Systems Inc.'s Neel Mehta, agreed that there were similarities between the PnP bug exploited by Zotob and MS05-051. "The scope of the affected platform is exactly the same, and these services are run by default on Windows 2000," said Mehta, who is team leader of the company's X-Force research team. "In terms of ease of exploitation, they're not incredibly difficult to exploit, but they're not as easy as the Plug and Play vulnerability"

Mehta is also concerned about the DirectShow bug. Attackers exploiting that vulnerability could seize control of unpatched Windows systems by tricking users into viewing malicious programs that appear to be legitimate multimedia files, he said. "It requires user interaction of some sort, which takes it down a notch from MS05-051, but it is still a serious vulnerability," he explained.

Microsoft has rated the DirectShow flaw "critical"

Reprinted with permission from Story copyright 2014 International Data Group. All rights reserved.
Our Commenting Policies