Exploits of unpatched Windows bug will jump, says Symantec
DirectShow zero-day now target of attack toolkit
Computerworld - An exploit of a still-unpatched vulnerability in Microsoft Windows XP and Server 2003 has been added to a multi-strike attack toolkit, Symantec said late last week, a move that may mean attacks will increase soon.
According to Symantec, an in-the-wild exploit of the DirectShow bug, which Microsoft acknowledged a month ago, has been added to at least one Web-based attack kit. "This will likely lead to wide-spread use in a short time," said Liam Murchu, a researcher with Symantec's security response group, in an entry posted to the company's blog on Friday.
Microsoft has not yet issued a fix for the DirectShow bug, which affects Windows 2000, XP and Server 2003, but not the newer Windows Vista or Server 2008. The flaw also doesn't affect the not-yet-released Windows 7.
However, attacks leveraging the bug have been tracked since May, when Microsoft issued a security advisory and confirmed it had evidence of "limited, active attacks."
Unlike other recent exploits of Microsoft zero-days -- vulnerabilities that haven't been patched by the time attack code surfaces -- the DirectShow attacks are not targeting specific individuals or organizations. "This is not a targeted attack, but is one of limited distribution," Ben Greenbaum, a senior research manager with Symantec, said in a telephone interview.
What caught researchers' attention, added Greenbaum, was that the DirectShow exploit piggybacked on a run-of-the-mill phishing attack. It's becoming more common, said Greenbaum, that a phishing site -- in this case a bogus log-in page for Microsoft's Windows Live software -- also hosts malware that tries to hijack PCs.
"They're thinking: 'Why not try to get them with everything we can?'" said Greenbaum, referring to the attackers.
The phishing site silently redirects visitors to another URL that hosts the DirectShow attack code, which is in the form of a malicious .avi file. Multiple malformed .dll files are also loaded onto the victimized system; those .dlls, in turn, load an encoded .exe payload that then downloads and installs a Trojan horse that adds the compromised PC to a growing botnet.
Although a patch is not yet available, Microsoft has suggested that users disable QuickTime parsing on Windows 2000, XP and Server 2003 machines. QuickTime, which is Apple's media player, is not flawed, but the QuickTime parser in DirectShow, a component of DirectX, is. Microsoft has posted a tool that automates the process of disabling QuickTime parsing in Windows; normally that requires editing the Windows registry, a chore many users avoid.
Microsoft's next regularly-scheduled security updates will be released July 14. Most researches expect the company to patch the DirectShow bug then.
Read more about Security in Computerworld's Security Topic Center.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts