Exploit code loose for six-month-old Windows bug
But Microsoft does not commit to a patch after researcher released attack
Computerworld - Microsoft Corp. yesterday acknowledged that exploit code is circulating for a vulnerability it reported six months ago, but it has yet to patch.
It's not clear whether Microsoft intends to fix the flaw next week.
On Thursday, Microsoft revised a security advisory it first posted April 19 about a bug in Windows XP, Vista, Server 2003 and Server 2008 that could be exploited to gain additional privileges on vulnerable machines. "Exploit code has been published on the Internet for the vulnerability addressed by this advisory," confirmed Bill Sisk, a communications manager at Microsoft's Security Response Center in a post to the MSRC blog.
The vulnerability has a convoluted history.
In late March, Argentinean security researcher Cesar Cerrudo announced he had found a bug that could let attackers bypass some of the security schemes in the newest versions of the operating system, including Windows Server 2008. At the time, Sisk called Cerrudo's bug a "design flaw" rather than a vulnerability, and downplayed the threat.
Only after Cerrudo presented his findings at a security conference in April in the United Arab Emirates did Microsoft change its tune and call the flaw a security problem.
On Wednesday, Cerrudo posted a proof-of-concept (PoC) exploit for the months-old vulnerability. "It has been a long time since [my April] presentation was published, so I decided to release a PoC exploit for Windows Server 2003 that allows [you] to execute code under [a] SYSTEM account," Cerrudo said in the description of his exploit on milw0rm.com.
"Basically, if you can run code under any service in Windows Server 2003 then you can own Windows," he added. "So if you can run code from an ASP .Net or classic ASP Web application, then you can own Windows, too."
Microsoft has yet to issue a fix for the flaw; since April its own move has been to recommend work-arounds for customers running Internet Information Services.
Not only has Microsoft not patched the problem, but it continued to be noncommittal about a fix yesterday. "Microsoft will take the appropriate action to protect our customers, which may include providing a solution through a service pack, our monthly security update release process, or an out-of-cycle security update, depending on customer needs," the advisory's boilerplate language read.
Sisk didn't promise a fix in his blog post, either. "We will continue to monitor the situation and post updates to the advisory and the MSRC blog as we become aware of any important new information," he said yesterday.
Also on Thursday, Microsoft published its monthly pre-patch notice outlining what would be fixed next week. Although six of the 11 expected updates will affect Windows, and two of those six will affect the editions called out by the April advisory, Microsoft does not provide enough detail prior to patching to determine whether one of those will fix the privilege elevation flaw.
Both of the potential updates were labeled as "important," Microsoft's second-from-the-top threat rating; the company typically ranks privilege elevation vulnerabilities as "important."
Microsoft will release October's security updates at approximately 1 p.m. EST on Tuesday.
Read more about Security in Computerworld's Security Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts