Microsoft patches 'super nasty' Windows bugs
Expect worm soon, says researcher, who sees damage potential on par with Blaster, Sasser
Computerworld - Microsoft Corp. today patched three vulnerabilities in the company's Server Message Block (SMB) file-sharing protocol, including two that could make "Swiss cheese" out of enterprise networks, according to one researcher.
"This is super nasty," said Eric Schultze, the chief technology officer at Shavlik Technologies LLC, who also called today's update "super critical" as he sounded the alarm. "Expect to see a worm on this one in the very near future, [because] this is Blaster and Sasser all over again."
Those two worms, 2003's Blaster and 2004's Sasser, wreaked havoc worldwide as they spread to millions of Windows machines.
Of the three bugs outlined in the MS09-001 security bulletin, two were rated "critical," the most serious ranking in Microsoft's four-step scoring system, while the third was pegged "moderate."
The pair identified as critical are extremely dangerous because attackers can exploit them simply by sending malformed data to unpatched machines, according to Schultze. "These flaws enable an attacker to send evil packets to a Microsoft computer and take any action they desire on that computer [with] no credentials required," he said. "The only prerequisite for this attack to be successful is a connection from the attacker to the victim over the NetBIOS ports, TCP 139 or TCP 445. By default, most computers have these ports turned on."
Much the same situation led to Blaster and Sasser, Schultze noted. "More people have blocked those ports, and more personal firewalls block them by default, but they are typically left open in a corporate network."
Amol Sarwate, manager of Qualys Inc.'s vulnerability lab, agreed. "The ports are always open [in the enterprise], and no user intervention is needed," he said. "This is nasty."
Today's update affects all currently-supported versions of Windows, including Windows 2000, XP, Server 2003, Vista and Server 2008, Microsoft noted. Although the newer editions -- Vista and Server 2008 -- are immune from one of the two critical vulnerabilities. The second critical bug -- which is also wormable, according to Schultze and Sarwate -- is rated as moderate for Vista and Server 2008, because those two operating systems have file-sharing disabled by default.
That, plus other mitigating circumstances, must be why Microsoft gave the three bugs its lowest exploitability index rating, even though two carried critical severity rankings, said Andrew Storms, director of security operations at nCircle Network Security Inc.
"This might be the first time that Microsoft has labeled a critical vulnerability all the way down to '3' on the exploitability index," said Storms, talking about Microsoft's relatively new practice of predicting the likelihood of attackers coming up with successful exploits for bugs in the coming month. Microsoft tagged all three of today's bugs with a "3" on its 1-3 exploitability index. According to the company, a "3" means "functioning exploit code is unlikely."
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast Best Practices: How to Improve Business Continuity with Virtualization VMware solutions include a range of business continuity capabilities to help ensure availability for applications across your virtualized environment. Learn More>>
- Live Webcast
Transforming Finance, Procurement and Supply Chain Effectiveness with Cross-Functional Analytics
Date: May 6th, 2014
Time: 1 PM EDT
Attend this Webcast to find out how Oracle's packaged analytic applications enable line-of-business managers to examine all...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts