Risk
11/11/2008
03:33 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Microsoft's November Patch Tuesday Unusually Light

The lone critical vulnerability affects Microsoft XML Core Services and, left unchecked, could allow remote code execution if the user visits a maliciously crafted Web page.

Microsoft on Tuesday released two Security Bulletins addressing four vulnerabilities.

The unusually light "Patch Tuesday" includes one bulletin rated "critical" and one bulletin rated "important."

The critical vulnerability, MS08-069, affects Microsoft XML Core Services. It could allow remote code execution if the user visits a maliciously crafted Web page.

The important vulnerability, MS08-068, addresses a publicly disclosed vulnerability in Microsoft Server Message Block (SMB) Protocol. It could allow remote code execution on an affected system, but it becomes a less serious issue if the user does not have administrative rights.

Eric Schultze, CTO of Shavlik Technologies, in an e-mailed statement, said that the MS08-068 is the more interesting of the two bulletins.

"It appears that MS08-068 (Important) is addressing a vulnerability that was first made public 7+ years ago (in 2001)," said Schultze. "Sir Dystic, from Cult of the Dead Cow, found a vulnerability in Microsoft operating systems that enabled attackers complete access to user's computers. He wrote a utility called SMBRelay to demonstrate the flaw. Microsoft was aware of the issue but didn't issue any security bulletins or patches to correct the behavior. Well, it looks like they've finally seen the light and have addressed this issue via the MS08-068 patch."

Schultze said he used to demonstrate this attack at classroom training sessions around the country and that participants had been surprised that Microsoft knew about the attack but hadn't fixed it.

Tyler Reguly, security research engineer at nCircle, in an e-mailed statement, also questioned Microsoft's assertion that MS08-069 deserves to be rated as the more significant of the two bulletins.

He cited the high risk of insider threats and said that SMB redirection represents "the ultimate insider attack in today's enterprise environment, where IE is often the corporate standard and can be made to pass credentials when a user simply visits a Web page."

One reason that Microsoft may have chosen to deal with this vulnerability is that SMB redirection has been available in the Metasploit framework for several months.

"Metasploit's SMB_Relay module greatly reduces the effort required to take advantage of this attack, allowing users to set up a fake Web page pointing to a host running Metasploit and exploiting each machine," said Reguly. "This ease of attack and the fact that the attack is already easily accessible to the public may mean we see increased exploitation compared to what we would usually see."

Last month, Microsoft released an out-of-band security update to address a critical flaw that could let a remote attacker take over Windows computers without any user interaction. Microsoft said it had done so because there was active exploitation of the vulnerability.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4262
Published: 2014-07-28
svnwcsub.py in Subversion 1.8.0 before 1.8.3, when using the --pidfile option and running in foreground mode, allows local users to gain privileges via a symlink attack on the pid file. NOTE: this issue was SPLIT due to different affected versions (ADT3). The irkerbridge.py issue is covered by CVE-...

CVE-2013-4840
Published: 2014-07-28
Unspecified vulnerability in HP and H3C VPN Firewall Module products SECPATH1000FE before 5.20.R3177 and SECBLADEFW before 5.20.R3177 allows remote attackers to cause a denial of service via unknown vectors.

CVE-2013-7393
Published: 2014-07-28
The daemonize.py module in Subversion 1.8.0 before 1.8.2 allows local users to gain privileges via a symlink attack on the pid file created for (1) svnwcsub.py or (2) irkerbridge.py when the --pidfile option is used. NOTE: this issue was SPLIT from CVE-2013-4262 based on different affected versions...

CVE-2014-2974
Published: 2014-07-28
Cross-site request forgery (CSRF) vulnerability in php/user_account.php in Silver Peak VX through 6.2.4 allows remote attackers to hijack the authentication of administrators for requests that create administrative accounts.

CVE-2014-2975
Published: 2014-07-28
Cross-site scripting (XSS) vulnerability in php/user_account.php in Silver Peak VX before 6.2.4 allows remote attackers to inject arbitrary web script or HTML via the user_id parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.