Microsoft scratches BEAST patch at last minute, but fixes Duqu bug
Admits Duqu-like browser-based attacks possible
Computerworld - Microsoft today issued 13 security updates, one less than expected, that patched 19 vulnerabilities in Windows, Internet Explorer (IE), Office, and Windows Media Player.
The company punted on one bulletin it had planned to deliver today after SAP told it that the patch broke some of its software.
"The bulletin scheduled to address Security Advisory 2588513 was postponed due to a third-party application compatibility issue that will be addressed by the vendor, with whom we're working directly," Jerry Bryant, group manager in Microsoft's Trustworthy Computing team, said in a statement.
The scrubbed security update was to fix the SSL (secure socket layer) 3.0 and TLS (transport layer security) 1.0 bug demonstrated in September 2011 by researchers who crafted a hacking tool dubbed BEAST, for "Browser Exploit Against SSL/TLS."
SAP, the German developer that creates enterprise business operations and management software, was the third-party vendor who reported compatibility problems. Microsoft added that it would rather pull a bulletin than "ship something that might inconvenience customers."
Microsoft did patch the vulnerability exploited by the Duqu intelligence-gathering Trojan, however; that flaw had been the subject of an advisory the company issued in early November after news broke of what some called a possible precursor to the next Stuxnet, the ultra-sophisticated worm that sabotaged Iran's nuclear program in 2010.
That update -- Microsoft calls them "bulletins" -- was one of three rated "critical," the company's top threat ranking. The remaining 10 were labeled "important," the next-lowest rating.
Microsoft called out the Duqu update, MS11-087, and another, MS11-092, as the ones customers should apply first. The latter affects Windows Media Player, Microsoft's audio-video-rich content utility.
Several security experts agreed with Microsoft's assessment of MS11-087.
"Duqu had to be at the top of the list, even though it was a very targeted attack," said Andrew Storms, director of security operations at nCircle Security.
"Now that they've patched the vulnerability, we'll have lots of people reverse engineering the patch to weaponize a drive-by exploit," said Wolfgang Kandek, chief technology officer at Qualys.
Duqu attacks uncovered this fall relied on malicious Word documents fed to victims as email attachments. But today Microsoft acknowledged that the underlying vulnerability could also be exploited using browser-based attacks.
In a post to Microsoft's Security & Defense Research blog, Chengyun Chu and Jonathan Ness, engineers at the Microsoft Security Response Center, noted an until-now-undisclosed "browser-based attack vector" via IE.
Jason Miller, of VMware's research and development team, warned that other browsers might be vulnerable to such attacks, too. For that reason and others, Miller expected hackers to eagerly dig into the Duqu fix.
"Microsoft dug deeper into the vulnerability, and discovered more attack vectors [than Word] because they are privy to the source code," Miller said, praising Microsoft's work. "But if I'm an attacker and I know Duqu was effective, I'd look into whether it could affect multiple browsers. That would give me an even bigger attack vector to use."
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts