Hackers exploit second DirectShow zero-day using thousands of hijacked sites
A new unpatched Windows bug surfaces; Microsoft hasn't patched the old one from May
Computerworld - Thousands of legitimate Web sites hacked over the weekend are launching drive-by attacks using an exploit of a second critical unpatched vulnerability in Windows' DirectShow component, a Danish security company said today.
According to CSIS Security Group, the bug is in an ActiveX control, the "msvidctl.dll" file, that streams video content.
"CSIS has captured more systematic drive-by attacks exploiting a vulnerability in Microsoft DirectShow," the company warned on its Web site. "Thousands of Web sites have been compromised over the weekend and malicious script has been insert[ed]," it added (Google Translate translation).
The script re-routes users to a malicious site, which in turn downloads and launches a multi-exploit hacker toolkit that includes the DirectShow attack code. DirectShow is a part of Windows' DirectX graphics infrastructure.
Windows 2000, XP and Server 2003 are all vulnerable to attack, CSIS said.
Another Danish security firm, Copenhagen-based Secunia, ranked the vulnerability as "Extremely critical," its highest threat rating. Secunia had no additional information about the bug, however.
This newly-exploited vulnerability is the second unpatched DirectShow bug to surface in the last five weeks. In late May, Microsoft issued a security advisory that reported hackers were exploiting a different DirectShow bug, this one in its QuickTime media parser. A week ago, Symantec said that attack code for the QuickTime parser vulnerability had been added to a multi-exploit toolkit, and that users should expect more attacks.
Hackers have been using the QuickTime parser bug since May, Microsoft has acknowledged.
Today, a Microsoft spokesman said that company security researchers would be posting information about the newest vulnerability soon.
Patches are not available for either vulnerability, although Microsoft has suggested that users disable QuickTime parsing on Windows 2000, XP and Server 2003 machines. To expedite that, Microsoft has posted a tool that automates the process. CSIS recommended that users protect themselves against the newest bug by setting the "kill bit" of the ActiveX control.
Microsoft's next regularly-scheduled security updates are due July 14. While most researches have said they expect the company to patch the DirectShow bug then, it's unclear whether Microsoft will fix the video streaming vulnerability at the same time.
Read more about Security in Computerworld's Security Topic Center.
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks...
- 5 Ways Dropbox for Business Keeps Your Data Protected Protecting your data isn't a feature on a checklist, something to be tacked on as an afterthought. Download here to find out how...
- The Keys to Securing Data in a Collaborative Workplace Losing data is costly. IT professionals have spent years learning how to protect their organizations from hackers, but how do you ward off...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!