Risk
11/11/2008
03:33 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Microsoft's November Patch Tuesday Unusually Light

The lone critical vulnerability affects Microsoft XML Core Services and, left unchecked, could allow remote code execution if the user visits a maliciously crafted Web page.

Microsoft on Tuesday released two Security Bulletins addressing four vulnerabilities.

The unusually light "Patch Tuesday" includes one bulletin rated "critical" and one bulletin rated "important."

The critical vulnerability, MS08-069, affects Microsoft XML Core Services. It could allow remote code execution if the user visits a maliciously crafted Web page.

The important vulnerability, MS08-068, addresses a publicly disclosed vulnerability in Microsoft Server Message Block (SMB) Protocol. It could allow remote code execution on an affected system, but it becomes a less serious issue if the user does not have administrative rights.

Eric Schultze, CTO of Shavlik Technologies, in an e-mailed statement, said that the MS08-068 is the more interesting of the two bulletins.

"It appears that MS08-068 (Important) is addressing a vulnerability that was first made public 7+ years ago (in 2001)," said Schultze. "Sir Dystic, from Cult of the Dead Cow, found a vulnerability in Microsoft operating systems that enabled attackers complete access to user's computers. He wrote a utility called SMBRelay to demonstrate the flaw. Microsoft was aware of the issue but didn't issue any security bulletins or patches to correct the behavior. Well, it looks like they've finally seen the light and have addressed this issue via the MS08-068 patch."

Schultze said he used to demonstrate this attack at classroom training sessions around the country and that participants had been surprised that Microsoft knew about the attack but hadn't fixed it.

Tyler Reguly, security research engineer at nCircle, in an e-mailed statement, also questioned Microsoft's assertion that MS08-069 deserves to be rated as the more significant of the two bulletins.

He cited the high risk of insider threats and said that SMB redirection represents "the ultimate insider attack in today's enterprise environment, where IE is often the corporate standard and can be made to pass credentials when a user simply visits a Web page."

One reason that Microsoft may have chosen to deal with this vulnerability is that SMB redirection has been available in the Metasploit framework for several months.

"Metasploit's SMB_Relay module greatly reduces the effort required to take advantage of this attack, allowing users to set up a fake Web page pointing to a host running Metasploit and exploiting each machine," said Reguly. "This ease of attack and the fact that the attack is already easily accessible to the public may mean we see increased exploitation compared to what we would usually see."

Last month, Microsoft released an out-of-band security update to address a critical flaw that could let a remote attacker take over Windows computers without any user interaction. Microsoft said it had done so because there was active exploitation of the vulnerability.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0607
Published: 2014-07-24
Unrestricted file upload vulnerability in Attachmate Verastream Process Designer (VPD) before R6 SP1 Hotfix 1 allows remote attackers to execute arbitrary code by uploading and launching an executable file.

CVE-2014-1419
Published: 2014-07-24
Race condition in the power policy functions in policy-funcs in acpi-support before 0.142 allows local users to gain privileges via unspecified vectors.

CVE-2014-2360
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules allow remote attackers to execute arbitrary code via packets that report a high battery voltage.

CVE-2014-2361
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules, when BreeZ is used, do not require authentication for reading the site security key, which allows physically proximate attackers to spoof communication by obtaining this key after use of direct hardware access or manual-setup mode.

CVE-2014-2362
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules rely exclusively on a time value for entropy in key generation, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by predicting the time of project creation.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.