We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
80,258 News Articles

New Windows security patch doesn't work

Researcher claims fix only mitigates the problem

A security researcher has claimed that a Microsoft security patch released last week doesn't do its job.

According to Tyler Reguly, a senior security engineer with nCircle Security, last Tuesday's MS09-008 update does not fix the problem for all users, many of whom may not realise that they're still vulnerable to attack.

"When you get a patch from a vendor, you expect it to provide some level of security," said Reguly. "But MS09-008 only mitigates the problem, it doesn't patch it."

MS09-008, one of three security updates released on March 10, addressed four separate flaws in Windows' DNS and WNS servers, and required that network administrators patch all currently-supported server editions of Windows, including Windows 2000 Server, Server 2003 and Server 2008.

Reguly has taken exception with the part of the update that addresses a vulnerability in the Web Proxy Auto-Discovery (WPAD) functionality of Windows DNS Server. "WPAD is a way to automatically configure proxy servers on machines," he explained.

"When the browser, like Internet Explorer, is configured to 'Automatically Detect Settings', it will look for wpad.company.com and attempt to resolve and pull down a configuration file. But if an attacker can manipulate the WPAD entry, all the traffic from those machines will go through his server. That would let him run 'man-in-the-middle' attacks to steal passwords or any other information."

Reguly said that while Microsoft provided a way to mitigate such attacks - the MS09-008 update lets administrators set up a 'block list' of domain names that the DNS server will not resolve - it didn't actually fix the underlying problem.

Worse, the update doesn't even execute on servers that already sport WPAD entries. "If you have a valid [WPAD] entry, it's not patched," said Reguly. Nor does Microsoft tell administrators that when they run the update.

"People will assume that they're protected when they're not," he said. "Ideally, Microsoft should have added an error message that when installing the update on a system with a WPAD entry that the mitigation hadn't been applied."

After Reguly first went public with his findings, Microsoft defended its approach. "WPAD is common enterprise functionality, and as such Microsoft needs to be very careful when releasing a security update to ensure that we both protect our customers, and do not break the functionality they have come to rely upon," Maarten Van Horenbeeck, a programme manager with the Microsoft Security Response Center said in an entry in its blog.

"When a DNS server already has an entry for either WPAD or ISATAP before the update is applied, it will not add that name to the block list, and will continue to answer requests for them," Van Horenbeeck said.

"This is necessary, as many of our customers legitimately use this functionality. Implementing a block list that blocks these names in all cases, requiring the administrator to remove them manually, would break these configurations."

PC security advice

Broadband speed tester

NEXT PAGE: Microsoft could have fixed the problem


IDG UK Sites

Nexus 6 vs Sony Xperia Z3 comparison: Lollipop phablet takes on KitKat flagship smartphone

IDG UK Sites

Why people aren't upgrading to iOS 8: new features are for power users, not the average Joe

IDG UK Sites

Free rocket & space sounds: NASA launches archive of interstellar audio on SoundCloud

IDG UK Sites

iPad Air 2 review: Insanely fast and alarmingly thin. Speed tests, camera tests, beautiful...