We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
80,259 News Articles

Microsoft may rush out emergency patches

Unpatched Microsoft bugs raise red flags

Microsoft has released its security updates for the month of September, but a couple of unpatched flaws have some security experts wondering if the software company will be forced to release an emergency patch sometime in the month ahead.

Security researchers believe that an unpatched flaw in the SMB (Server Message Block) 2 software that ships with Windows Vista and Windows Server 2008 could turn into a major headache.

Proof-of-concept code showing how the bug could be used to crash a Windows machine was posted on Monday to the Full Disclosure mailing list by Laurent Gaffie. But security experts believe that more serious attacks are possible.

Kostya Korchinsky, a senior security researcher with security-assessment software vendor Immunity, said the flaw could be exploited in a privilege-escalation attack. This type of attack is used once the attacker has already found a way to run software on the victim's machine. It gives the hacker a way of accessing system resources that would otherwise be prohibited.

A more dangerous 'remote-code execution' attack "might be possible, but it would be a lot more difficult", Korchinsky said. With remote-code execution, the attacker is able to run unauthorised software on the victim's machine.

Security vendor SourceFire is examining the bug too. "We're unwilling to call it a DoS-only, but we're not willing to call it a remote-code-execution [flaw] either," said Matt Watchinski, the company's senior director of vulnerability research, referring to a denial-of-service attack.

SMB 2 is typically blocked at the firewall, so even if these attacks could be written, they would have a hard time spreading from company to company.

Gaffie said the flaw most likely works on Windows 7, Windows Vista and Windows Server 2008. Earlier versions of Windows do not use SMB 2 and are thought to be immune.

Meanwhile, Microsoft has yet to patch a flaw in its Internet Information Services (IIS) software that was disclosed last week. That bug could let an attacker crash an IIS server, or even install unauthorised software in certain configurations.

The flaw could be used in a remote-code execution attack, but only in very specific circumstances. For the attack to work, the victim must run the older IIS 5 software on Windows 2000 and allow the attacker to create an ftp directory on the server.

Although Microsoft says it's seen a "limited number" of attacks that leverage this bug, Watchinski said it's unlikely to affect most IIS users.

Microsoft issued five security patches Tuesday, fixing eight vulnerabilities in Windows.

See also:

Windows security advice

IDG UK Sites

Acer Aspire R11 review: Hands-on with the 360 laptop and tablet convertible

IDG UK Sites

Apple Watch release day: Twitter reacts

IDG UK Sites

See how Framestore created a shape-shifting, oil and metal based creature for Shell

IDG UK Sites

Apple Watch buying guide, price list & where to buy today: Which Apple Watch model, size, material,?......