Patches Released for Critical Security Issues for Microsoft Windows

Hopefully you are not using a friends computer to read this report. Microsoft has just issued a patch marked as ‘Critical’ which applies to Windows 2000, XP, and Server 2003 – and another patch marked ‘Important’ for Windows Vista and Serer 2008.

The critical vulnerability, according to Microsoft, is caused by the operating system’s improper handling of specifically crafted remote procedure call (RPC) requests. The problem is already being exploited in the wild and can allow attackers to gain full control of a computer. Microsoft also added that the windows firewall can be used to block such an attack.

Quoting a Microsoft security bulletin:

It is possible that this vulnerability could be used in the crafting of a wormable exploit. Firewall best practices and standard default firewall configurations can help protect network resources from attacks that originate outside the enterprise perimeter.”

On older Windows operating systems, 2000, XP, and Server 2003, attackers can gain access to networks as anonymous users. They would still be able to access networks using the Vista and Server 2008 exploits, but they need to be an authenticated user.

Microsoft claims that it had discovered the flaw itself, rather than through a security firm or by monitoring ‘chatter’ on hacker websites. Microsoft normally issues Windows updates on the second Tuesday of each month – these patches have been released ahead of regular schedule due to high importance of course. These kind of updates are referred to as ‘out-of-band’ releases.

More information regarding these security issues can be found on the United States Computer Emergency Readiness Team (US-CERT) under Technical Cyber Security Alert TA08-297A and SA08-297A.

  • jhansonxi
    These two statements seem conflicting:
    "Microsoft claims that it had discovered the flaw itself, rather than through a security firm or by monitoring ‘chatter’ on hacker websites."

    "The problem is already being exploited in the wild and can allow attackers to gain full control of a computer."

    So Microsoft "discovers" a flaw all by itself and releases a surprise patch while there are "exploits in the wild". Do the exploiters work on the Windows developer team or did they get advanced info through MSDN?

    "Microsoft also added that the windows firewall CAN be used to block such an attack."
    In other words it doesn't have any effect on the exploit by default.
    Reply
  • HaZ
    jhansonxiThese two statements seem conflicting:"Microsoft claims that it had discovered the flaw itself, rather than through a security firm or by monitoring ‘chatter’ on hacker websites.""The problem is already being exploited in the wild and can allow attackers to gain full control of a computer."So Microsoft "discovers" a flaw all by itself and releases a surprise patch while there are "exploits in the wild". Do the exploiters work on the Windows developer team or did they get advanced info through MSDN?"Microsoft also added that the windows firewall CAN be used to block such an attack."In other words it doesn't have any effect on the exploit by default.
    Pretty Naive response - just because one person finds something, doesn't mean nobody else is allowed to find the same thing.

    It could be that Microsoft discovered it, then also discovered that it was already being exploited. Maybe not exploited on a grand scale yet though.

    And yes Captain obvious, the firewall is no good by default, but who DIDN'T know this already?
    Reply
  • one-shot
    I was actually told about this a few days ago. A friend's aunt, who is a programmer said that some attacks are going to come in the next few weeks. Then I read this article, Sounds real, but my pc is updated and anti virus is good so I should be alright.
    Reply
  • jhansonxi
    kami3kNot necessarily true. It depends on the method of the hack. If they're targeting your PC specifically then you are correct. But most exploits are mass attacks usually delivered by malware of some sort. If a particular malware is discovered by the anti-virus developers, and a detection pattern is written, and the pattern is published as a definition update for the anti-virus version one-shot uses, and one-shot updates the anti-virus with the new definitions, then the protection is effective for that exploit-containing malware. Of course, that's a lot of ifs and one-shot might be an "early adopter" of the malware or encounter a different malware.

    The Windows firewall could be updated to block the exploit but I suspect it probably breaks some other Windows functionality that relies on the RPCs.
    Reply
  • Zorg
    Maybe just get the security patch and move on. That's what I did.
    Reply
  • 0mg_1ts_m3
    this little fix might help, but it's completely retarded. it fucked up sony vegas on me so i had to call sony and waste my day trying to find out how to reactivate it. windows is a piece of shit. and so is microsoft.
    Reply
  • Zorg
    Sony bites the big one as well, they were probably equally if not completely at fault. The problem was probably related to one of their rootkit DRM schemes, or some other equally invasive garbage.
    Reply
  • neiroatopelcc
    0mg_1ts_m3this little fix might help, but it's completely retarded. it fucked up sony vegas on me so i had to call sony and waste my day trying to find out how to reactivate it. windows is a piece of shit. and so is microsoft.Then replace windows with something else? If you don't like it, don't use it. Same goes for anything. Microsoft didn't promise you that an update won't break 3rd party software compatibility when you bought Windows.
    Reply
  • Zorg
    Yeah, and Sony didn't promise that they wouldn't screw you any way that they possibly could.

    I do agree with you and I haven't given Sony a dime for anything in a long time. I hope they go belly up.
    Reply
  • bounty
    "Microsoft claims that it had discovered the flaw itself"

    Microsoft discovering the flaw:
    "Hey look, I've discovered that someone took over Bill's computer. We better post a patch before securityfocus.com posts a detailed write up and exploit code."
    Reply