Attackers exploit unpatched flaw to hit Windows XP, Server 2003
A vulnerability in Windows XP and Windows Server 2003 is exploited with a flaw in Adobe Reader in a new attack, researchers at FireEye said
IDG News Service - Attackers are exploiting a new and unpatched vulnerability in Windows XP and Windows Server 2003 that allows them to execute code with higher privileges than they have access to.
The vulnerability is located in NDProxy.sys, "a system-provided driver that interfaces WAN miniport drivers, call managers, and miniport call managers to the Telephony Application Programming Interfaces (TAPI) services."
"An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode," Microsoft said in a security advisory published Wednesday. "An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights."
This is an elevation-of-privilege (EoP) vulnerability, not a remote code execution one, which means that attackers need to already have access to a low-privileged account on the targeted system in order to exploit it.
According to Microsoft, this vulnerability is already being exploited in "limited, targeted attacks," but doesn't affect Windows versions newer than Windows XP and Windows Server 2003.
The company provided a temporary workaround that involves disabling NDProxy.sys, but this will cause certain services which depend on TAPI, like Remote Access Service (RAS), dial-up networking and virtual private networking (VPN), to no longer work.
Microsoft credited security vendor FireEye with helping the company investigate the new vulnerability, which is being tracked as CVE-2013-5065.
This EoP vulnerability is being exploited in attacks in conjunction with a remote code execution vulnerability in older versions of Adobe Reader that was patched in May, FireEye security researchers Xiaobo Chen and Dan Caselden said Wednesday in a blog post. The exploit targets computers running Adobe Reader on Windows XP with Service Pack 3, but users who have the latest versions of Adobe Reader installed should be protected, they said.
According to the FireEye researchers, if the exploit is successful, an executable file is dropped in the Windows temporary directory and is executed.
The exploit is used in targeted attacks, but the FireEye researchers are still investigating the method used to distribute it and the identity of the targets. The exploit installs malware that connects back to and communicates with a few hacked websites, the company said via email. However, other details about what the malware is designed to do have yet to be determined.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The Threat Landscape Hardly a day goes by without the discovery of a new cyberthreat somewhere in the world! But how do you keep up with...
- Security for Virtualization In the rush to implement virtualization, security has become second. So while the business benefits are clear, the risks are less well documented...
- Gartner 2013 Magic Quadrant for Enterprise Backup/Recovery Software See why CommVault was positioned as the #1 leader in Gartner's 2013 Magic Quadrant for Enterprise Backup/Recovery software for the 3rd year in...
- Forrester Report: CommVault is a Leader in Enterprise Backup and Recovery In this report, Forrester takes a deep dive into the evaluation criteria, how CommVault is positioned and the features and functionality that make...
- Four Myths of High-Productivity App Dev Debunked Debunk the main myths surrounding high-productivity application development and how both platforms have overcome them.
On-Demand Webcast: 7 Reasons to Choose VoIP
Thinking about a new phone system for your business?
Be sure to watch this informative webcast. Steve Strauss, small business columnist for USA...
All Malware and Vulnerabilities White Papers |