We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
80,259 News Articles

Researcher to show code for Windows flaw

Get this Tuesday's patches

With security vendors worrying that a recently patched Windows bug may lead to a major worm outbreak, the researcher who discovered the flaw said yesterday that he is weeks away from releasing code that exploits the problem.

HD Moore, developer of the Metasploit hacking tool, has developed software that could be used to crash a system that has not received Microsoft's MS06-035 update, released on Tuesday. However, the software could not be used to create the kind of self-replicating worm that some vendors see as a possibility, he said.

Microsoft fixed Moore's bug on Tuesday in the MS06-035 update to its Windows Server services, which is used for file-sharing between PCs. Security researchers worry that if hackers find a way to reliably use this flaw to run their malicious code on PCs, this could lead to a widespread outbreak, similar to the Blaster outbreak in 2003.

Moore believes it is unlikely such a worm will emerge.

"The... bug is serious and can result in kernel-level memory corruption, but the chances of it becoming a working exploit are pretty slim," he said yesterday in an email interview.

Moore said that the numerous flaws in Microsoft's Office products that were patched on Tuesday have more potential for exploitation by hackers.

nCircle Network Security Inc. had warned that this bug was the firstserious vulnerability in 2006 with the potential to spawn a widespread worm. On Wednesday, the company said that Moore's assessment was good news for IT professionals. "I have a lot of respect for HD, and if he says it's hard, [to exploit the bug] then it probably is," said Mike Murray, nCircle's director of vulnerability research. "Since he's the one who discovered it, he's probably got the biggest head start on it."

However, nCircle and many other security researchers are taking a close look at the flaw. "If it's possible to write an exploit for this in any reliable way, it's going to be really bad," he said.

Microsoft downplayed the risk of a worm outbreak on Tuesday, saying that most Windows systems turn off the Windows Server service by default and pointing out that most firewalls block the SMB (server message block) protocol that is uses for communication.

But since most Windows machines use the service, the flaw is still a concern, according to Murray. "Firewalls are not enough," he said.

"That's the kind of message that they could get away with in 1995," Murray said of Microsoft's comments. "Vulnerabilities in SMB and RPC [the Remote Procedure Call interface] are the most serious that they have these days."

Whatever the risk, it will still be weeks before Moore releases his exploit code.

That's because it is connected to a second undisclosed flaw that affects many other software products. Moore is checking first to see which of these vendors have patched their products before releasing any information on either vulnerability.

Microsoft's MS06-035 bulletin can be found here.

IDG UK Sites

Windows 10 for phones UK release date, price and new features: When will my phone get Windows 10?

IDG UK Sites

It's World Backup Day 2015! Don't wait another minute: back up now

IDG UK Sites

How Lightroom works: Where are my photos and how do I back up?

IDG UK Sites

Best Mac: Apple Mac buyers guide for 2015: iMac, MacBook, MacBook Air, MacBook Pro, Mac mini and...