Microsoft to patch unhackable Windows 7 bug later today
Continues 'defense-in-depth' practice by patching flaw in Vista, Windows 7, Server 2008
But Microsoft will also offer the same update to users running Windows Vista, Windows 7 and Windows Server 2008, even though the company maintained last week that they were impervious to attack.
"Windows 7 users will be offered Bulletin 7 as a defense-in-depth update even though the [advanced notification] states that the issue does not affect Windows 7," said Jerry Bryant, a group manager with the Microsoft Security Response Center, in one of several e-mails replying to questions. "This means that the vulnerable code is in the software, but due to the improved protections built into Windows 7, there are no known vectors to reach it."
In other words, the vulnerability is there -- in Vista, Windows 7 and Server 2008 -- but Microsoft doesn't know how it could be exploited.
Better safe than sorry, security experts said.
"Absolutely, it's a good practice to fix these bugs," said Andrew Storms, director of security operations at nCircle Network Security. "Just a year ago, DEP [data execution prevention] and ASLR [address space layout randomization] were mitigating nearly every vulnerability for Internet Explorer on Vista. Yet we are seeing a steady rise in more researchers' finding and taking advantage of DEP bypass methods. And if DEP bypass continues to happen more often, then we'll be happy that Microsoft issued these fixes."
Wolfgang Kandek, chief technology officer at security risk and compliance management provider Qualys, not only agreed, but cited DEP and ASLR circumventions as well. "Installing the update for Windows 7, Server 2008 and Vista is definitely a recommended, and preemptive, action," he said. "We have seen cases in the past where attackers were able to string together multiple vulnerabilities to reach their goal, most recently at CanSecWest, where Peter Vreugdenhil used two bypasses to first get by ASLR, then DEP when he exploited IE8."
For his exploit expertise, Vreugdenhil, a Dutch freelance researcher, last month won $10,000 during the Pwn2Own hacking contest. His one-two punch was called "particularly impressive" by the contest organizer because it sidestepped DEP and ASLR, two cornerstones of Vista's and Windows 7's security.
Microsoft has patched untouchable vulnerabilities before, Bryant confirmed, citing several examples, including MS09-032, a July 2009 update that disabled a company-made ActiveX control said to be unexploitable in Vista or Server 2008. Prior to that, Microsoft issued MS09-015 (April 2009) and MS08-062 (October 2008) for similar defense-in-depth reasons.
- Troubleshooting Common Issues in VoIP Learn more about Voice over Internet Protocol (VoIP), including common VoIP metrics used, best practices in VoIP management and tips and tricks for...
- 2013 Network Management Software (NMS) Buyers Guide This white paper contains an independent comparison study of six different network management solutions and provides guidance on how you can choose the...
- Rightsizing Your Network Performance Management Solution: 4 Case Studies This white paper discusses challenges encountered as organizations search for the most cost-effective network performance management solution.
- Global Growing Pains: Tapping into B2B Integration Services to Overcome Global Expansion Challenges A recent survey by IDG Research explored both the challenges and pain points companies face when growing globally, as well as the capabilities...
- E-Signature RFP Checklist Webcast If your organization is looking to adopt e-signatures, you may be overwhelmed by the number of providers that offer seemingly similar solutions. How...
- Cloud and Collaboration: Driving Your Business Value Mission Critical Cloud from Peer 1 Hosting is enterprise-grade. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!