Hackers exploit unpatched Windows bug
Attacks in progress, warns Microsoft; Vista and Windows 7 called safe
Computerworld - For the third time in the last 90 days, Microsoft Corp. has warned that hackers are exploiting an unpatched critical vulnerability in its software.
Late Thursday, Microsoft issued a security advisory that said malicious hackers were already using attack code that leveraged a bug in DirectX, a Windows subsystem crucial to games and used when streaming video from Web sites.
Hackers are using malicious QuickTime files -- QuickTime is rival Apple Inc.'s default video format -- to hijack PCs, Microsoft said. "The vulnerability could allow remote code execution if [the] user opened a specially crafted QuickTime media file," the company said in the advisory. "Microsoft is aware of limited, active attacks that use this exploit code."
According to Christopher Budd, a spokesman for the Microsoft Security Response Center, QuickTime itself is not flawed. Instead, the QuickTime parser in DirectShow, a component of DirectX, contains the bug. "An attacker would try and exploit the vulnerability by crafting a specially formed video file and then posting it on a website or sending it as an attachment in e-mail,," Budd said in an entry on the MSRC blog.
Because the bug is in DirectShow, any browser using a plug-in that relies on DirectShow is also vulnerable.
DirectX 7, 8 and 9 in Windows 2000, XP and Server 2003 are at risk, Budd said, but Vista, Server 2008 and Windows 7 are not. "Our investigation has shown that the vulnerable code was removed as part of our work building Windows Vista," Budd said.
Until a patch is available, users can protect their PCs by disabling QuickTime parsing. To do that requires editing the Windows registry, normally a task most users shy from, but Microsoft has automated the workaround. "We've gone ahead and built a 'Fix it' that implements the 'Disable the parsing of QuickTime content in quartz.dll' registry change," Budd said. "We have also built a 'Fix it' that will undo the workaround automatically."
"Fix it" is the name Microsoft's given to downloadable tools it has added to some of the support documents on its Knowledge Base (KB), the online collection of troubleshooting instructions. Microsoft debuted "Fix it" buttons late last year.
Budd said that Microsoft is working on a patch for the problem, but he didn't give a time table. It's unlikely the company will deliver a fix on June 9, the next scheduled date for its security updates. Microsoft patched the Excel bug, which it disclosed in February, two months later; it patched the PowerPoint vulnerability about five weeks after it warned users.
Read more about Security in Computerworld's Security Topic Center.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts