We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
80,258 News Articles

Microsoft may rush out emergency patches

Unpatched Microsoft bugs raise red flags

Microsoft has released its security updates for the month of September, but a couple of unpatched flaws have some security experts wondering if the software company will be forced to release an emergency patch sometime in the month ahead.

Security researchers believe that an unpatched flaw in the SMB (Server Message Block) 2 software that ships with Windows Vista and Windows Server 2008 could turn into a major headache.

Proof-of-concept code showing how the bug could be used to crash a Windows machine was posted on Monday to the Full Disclosure mailing list by Laurent Gaffie. But security experts believe that more serious attacks are possible.

Kostya Korchinsky, a senior security researcher with security-assessment software vendor Immunity, said the flaw could be exploited in a privilege-escalation attack. This type of attack is used once the attacker has already found a way to run software on the victim's machine. It gives the hacker a way of accessing system resources that would otherwise be prohibited.

A more dangerous 'remote-code execution' attack "might be possible, but it would be a lot more difficult", Korchinsky said. With remote-code execution, the attacker is able to run unauthorised software on the victim's machine.

Security vendor SourceFire is examining the bug too. "We're unwilling to call it a DoS-only, but we're not willing to call it a remote-code-execution [flaw] either," said Matt Watchinski, the company's senior director of vulnerability research, referring to a denial-of-service attack.

SMB 2 is typically blocked at the firewall, so even if these attacks could be written, they would have a hard time spreading from company to company.

Gaffie said the flaw most likely works on Windows 7, Windows Vista and Windows Server 2008. Earlier versions of Windows do not use SMB 2 and are thought to be immune.

Meanwhile, Microsoft has yet to patch a flaw in its Internet Information Services (IIS) software that was disclosed last week. That bug could let an attacker crash an IIS server, or even install unauthorised software in certain configurations.

The flaw could be used in a remote-code execution attack, but only in very specific circumstances. For the attack to work, the victim must run the older IIS 5 software on Windows 2000 and allow the attacker to create an ftp directory on the server.

Although Microsoft says it's seen a "limited number" of attacks that leverage this bug, Watchinski said it's unlikely to affect most IIS users.

Microsoft issued five security patches Tuesday, fixing eight vulnerabilities in Windows.

See also:

Windows security advice

IDG UK Sites

Sony Xperia Z3+ (UK Sony Xperia Z4) UK release date, price and specification: Pre-order the Sony Xp9......

IDG UK Sites

Why Intel’s vision of the future is a future I want to live in

IDG UK Sites

What Jony Ive's new job means for Apple design

IDG UK Sites

Jony Ive 'semi-retired' into new role: kicked upstairs as Chief Design Officer