Microsoft patches long-known Windows bugs
One flaw was disclosed 22 months ago but never exploited, says company; another may be 7 or 8 years old
Computerworld - Microsoft Corp. today patched four vulnerabilities in two security updates for Windows and Office, including a critical bug that had been publicly disclosed nearly two years ago.
The most serious of the two updates, MS08-069, fixed three separate flaws in XML Core Services, the component that not only provides interoperability between several scripting languages -- including JScript and Visual Studio -- and XML applications, but more importantly allows Internet Explorer to render XML-based content.
"The name says it all," said Andrew Storms, director of security operations at nCircle Network Security Inc. "This is a core service for all versions of Microsoft Windows, and it will certainly be a source of research for attackers."
Other security experts agreed. "The XML Core Services vulnerability is more of a concern, because it will have more of an opportunity to be exploited," said Ben Greenbaum, a senior research manager at Symantec Corp., referring to the over-the-Internet vector that attackers could take to leverage the flaw.
"It affects most versions of Windows," echoed Amol Sarwate, manager of Qualys Inc.'s vulnerabilities research lab. "It's much more mainstream than the other, but it would require some kind of user intervention, so wormable code is not likely."
Of the three bugs patched in MS08-069, the only one named "critical" was pegged with a CVE (Common Vulnerabilities and Exposures) label in early 2007, and according to Microsoft, went public more than 22 months ago.
At that time, noted Polish security researcher Michal Zalewski, who now works for Google Inc., posted details about several Internet Explorer flaws to the Bugtraq mailing list. Zalewski also pointed out that he had first brought up the problem six months before that, when he described a flaw in Mozilla Corp.'s Firefox and said that other browsers were unlikely to be immune.
The vulnerability turned out to be not in IE itself, but in a service it relies on, XML Core Services, Greenbaum said. He and the other researchers, however, were at a loss to explain, if some information had been released in early 2007, why hackers had not exploited the bug.
But they had ideas.
"Perhaps the skill level [needed by the hacker] was high," Storms said. "There might have also been enough mitigating factors to make it difficult to exploit."
Sarwate seconded that. "According to Microsoft's Exploitability Index, it involves a race condition," he said, "which means the reliability of an exploit really depends on what other resources are available on the target. In other words, an exploit might not work on every machine."
This is the second month that Microsoft has posted estimates in its Exploitability Index of how likely it is that attack code would be generated in the next 30 days. The company pinned the Zalewski bug with its second-highest ranking: "inconsistent exploit code likely."
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts