Hackers exploit latest Microsoft zero-day bug
Microsoft raises warning as attacks exploit ASP.Net flaw, urges admins to apply workaround
Computerworld - Microsoft has warned users that hackers are exploiting the unpatched bug in ASP.Net to hijack encrypted Web sessions.
In a Monday update to a previously-published security advisory, Microsoft said that it was seeing "limited, active attacks at this time."
Symantec, which has a massive global network of sensors and honey trap-like systems to detect and capture exploits, said it had not seen any attacks, however.
The vulnerability exists in all versions of ASP.Net, the company's Web application framework used to craft millions of sites and applications, and lets attackers access Web applications with full administrator rights; decrypt session cookies or other encrypted data on a remote server; and access and snatch files from a site or Web application that relies on ASP.Net.
Microsoft acknowledged the flaw last Friday, the same day that a pair of researchers demonstrated how the "oracle padding" bug can be exploited by force-feeding cipher text to an ASP.Net application and noting the returned error messages it returns.
The company again promised to patch the vulnerability, but like last week, did not set a delivery date for the fix.
"We will be releasing a patch on Windows Update, so all machines will get it," said Scott Guthrie, the Microsoft executive who runs the ASP.Net development team.
The next regularly-scheduled security updates will ship Oct. 12, a little less than three weeks from today.
Occasionally Microsoft issues emergency patches -- called "out-of-band" updates -- to tackle problems, almost always after attacks appear.
Until the company releases a fix, Guthrie continued to urge Web site and application developers to plug the hole with a temporary workaround that involves editing the "web.config" file.
SharePoint Server 2007 and SharePoint 2010 are also vulnerable to ASP.Net attacks, said Microsoft. The SharePoint team has published different web.config editing instructions for its high-profile, highly-profitable collaboration software.
Microsoft wasn't downplaying the threat to Web sites and applications. "The publicly disclosed exploit can be used against all types of ASP.NET applications," Guthrie said in a FAQ he posted Monday.
"All sites that use ASP.NET are affected by this vulnerability," echoed Kevin Brown, an engineer with the Microsoft Security Response Center.
The MSRC also took its usual shot at researchers who publicly disclose bugs in its products before a patch is ready. In an entry to the group's blog, spokesman Dave Forstrom cited "coordinated vulnerability disclosure," a term Microsoft coined last summer to describe how it wants outside researchers to behave.
"We fundamentally believe, and history has shown, that once vulnerability details are released publicly, the probability of exploitation rises significantly," Forstrom said. "Without coordination in place to provide a security update or proper guidance, risk to customers is greatly amplified."
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer or subscribe to Gregg's RSS feed . His e-mail address is firstname.lastname@example.org.
Read more about Security in Computerworld's Security Topic Center.
- The Pivotal Big Data Suite- Reducing the Risks of Big Data The explosion of big data and the rapid evolution of big data tools and technologies is challenging IT to meet the demands of...
- A Survival Guide for Data in the Wild All corporate data used to reside in the data center. Safe and sound behind the corporate firewall. But now, employees have multiple devices...
- Transforming Security: Designing a State-of-the-Art Extended Team The information security mission is no longer about implementing and operating controls.
- The Big Data Security Analytics Era Is Here New security risks and old security challenges often overwhelm legacy security controls and analytical tools.
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!