Risk
11/11/2008
03:33 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Microsoft's November Patch Tuesday Unusually Light

The lone critical vulnerability affects Microsoft XML Core Services and, left unchecked, could allow remote code execution if the user visits a maliciously crafted Web page.

Microsoft on Tuesday released two Security Bulletins addressing four vulnerabilities.

The unusually light "Patch Tuesday" includes one bulletin rated "critical" and one bulletin rated "important."

The critical vulnerability, MS08-069, affects Microsoft XML Core Services. It could allow remote code execution if the user visits a maliciously crafted Web page.

The important vulnerability, MS08-068, addresses a publicly disclosed vulnerability in Microsoft Server Message Block (SMB) Protocol. It could allow remote code execution on an affected system, but it becomes a less serious issue if the user does not have administrative rights.

Eric Schultze, CTO of Shavlik Technologies, in an e-mailed statement, said that the MS08-068 is the more interesting of the two bulletins.

"It appears that MS08-068 (Important) is addressing a vulnerability that was first made public 7+ years ago (in 2001)," said Schultze. "Sir Dystic, from Cult of the Dead Cow, found a vulnerability in Microsoft operating systems that enabled attackers complete access to user's computers. He wrote a utility called SMBRelay to demonstrate the flaw. Microsoft was aware of the issue but didn't issue any security bulletins or patches to correct the behavior. Well, it looks like they've finally seen the light and have addressed this issue via the MS08-068 patch."

Schultze said he used to demonstrate this attack at classroom training sessions around the country and that participants had been surprised that Microsoft knew about the attack but hadn't fixed it.

Tyler Reguly, security research engineer at nCircle, in an e-mailed statement, also questioned Microsoft's assertion that MS08-069 deserves to be rated as the more significant of the two bulletins.

He cited the high risk of insider threats and said that SMB redirection represents "the ultimate insider attack in today's enterprise environment, where IE is often the corporate standard and can be made to pass credentials when a user simply visits a Web page."

One reason that Microsoft may have chosen to deal with this vulnerability is that SMB redirection has been available in the Metasploit framework for several months.

"Metasploit's SMB_Relay module greatly reduces the effort required to take advantage of this attack, allowing users to set up a fake Web page pointing to a host running Metasploit and exploiting each machine," said Reguly. "This ease of attack and the fact that the attack is already easily accessible to the public may mean we see increased exploitation compared to what we would usually see."

Last month, Microsoft released an out-of-band security update to address a critical flaw that could let a remote attacker take over Windows computers without any user interaction. Microsoft said it had done so because there was active exploitation of the vulnerability.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0485
Published: 2014-09-02
S3QL 1.18.1 and earlier uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object in (1) common.py or (2) local.py in backends/.

CVE-2014-3861
Published: 2014-09-02
Cross-site scripting (XSS) vulnerability in CDA.xsl in HL7 C-CDA 1.1 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted reference element within a nonXMLBody element.

CVE-2014-3862
Published: 2014-09-02
CDA.xsl in HL7 C-CDA 1.1 and earlier allows remote attackers to discover potentially sensitive URLs via a crafted reference element that triggers creation of an IMG element with an arbitrary URL in its SRC attribute, leading to information disclosure in a Referer log.

CVE-2014-5076
Published: 2014-09-02
The La Banque Postale application before 3.2.6 for Android does not prevent the launching of an activity by a component of another application, which allows attackers to obtain sensitive cached banking information via crafted intents, as demonstrated by the drozer framework.

CVE-2014-5136
Published: 2014-09-02
Cross-site scripting (XSS) vulnerability in Innovative Interfaces Sierra Library Services Platform 1.2_3 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.