Hackers exploit second DirectShow zero-day using thousands of hijacked sites
A new unpatched Windows bug surfaces; Microsoft hasn't patched the old one from May
Computerworld - Thousands of legitimate Web sites hacked over the weekend are launching drive-by attacks using an exploit of a second critical unpatched vulnerability in Windows' DirectShow component, a Danish security company said today.
According to CSIS Security Group, the bug is in an ActiveX control, the "msvidctl.dll" file, that streams video content.
"CSIS has captured more systematic drive-by attacks exploiting a vulnerability in Microsoft DirectShow," the company warned on its Web site. "Thousands of Web sites have been compromised over the weekend and malicious script has been insert[ed]," it added (Google Translate translation).
The script re-routes users to a malicious site, which in turn downloads and launches a multi-exploit hacker toolkit that includes the DirectShow attack code. DirectShow is a part of Windows' DirectX graphics infrastructure.
Windows 2000, XP and Server 2003 are all vulnerable to attack, CSIS said.
Another Danish security firm, Copenhagen-based Secunia, ranked the vulnerability as "Extremely critical," its highest threat rating. Secunia had no additional information about the bug, however.
This newly-exploited vulnerability is the second unpatched DirectShow bug to surface in the last five weeks. In late May, Microsoft issued a security advisory that reported hackers were exploiting a different DirectShow bug, this one in its QuickTime media parser. A week ago, Symantec said that attack code for the QuickTime parser vulnerability had been added to a multi-exploit toolkit, and that users should expect more attacks.
Hackers have been using the QuickTime parser bug since May, Microsoft has acknowledged.
Today, a Microsoft spokesman said that company security researchers would be posting information about the newest vulnerability soon.
Patches are not available for either vulnerability, although Microsoft has suggested that users disable QuickTime parsing on Windows 2000, XP and Server 2003 machines. To expedite that, Microsoft has posted a tool that automates the process. CSIS recommended that users protect themselves against the newest bug by setting the "kill bit" of the ActiveX control.
Microsoft's next regularly-scheduled security updates are due July 14. While most researches have said they expect the company to patch the DirectShow bug then, it's unclear whether Microsoft will fix the video streaming vulnerability at the same time.
Read more about Security in Computerworld's Security Topic Center.
- Top 10 Reasons to Strengthen Information Security with Desktop Virtualization Regain control and reduce risk without sacrificing business productivity and growth
- Preventing Sophisticated Attacks: Anti-Evasion & Advanced Evasion Techniques McAfee Next Generation Firewall applies sophisticated analysis techniques specifically to detect advanced evasion techniques (AET).
- The Security Industry's Dirty Little Secret The debate over advanced evasion techniques (AETs) This report summarizes the findings of a McAfee commissioned research group to determine the level of understanding IT security professionals have about AETs...
- Demand More, Get the Most from the Move to a Next-Generation Firewall Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!