Microsoft's November Patch Tuesday Unusually LightThe lone critical vulnerability affects Microsoft XML Core Services and, left unchecked, could allow remote code execution if the user visits a maliciously crafted Web page.
Microsoft on Tuesday released two Security Bulletins addressing four vulnerabilities.
The unusually light "Patch Tuesday" includes one bulletin rated "critical" and one bulletin rated "important."
The critical vulnerability, MS08-069, affects Microsoft XML Core Services. It could allow remote code execution if the user visits a maliciously crafted Web page.
The important vulnerability, MS08-068, addresses a publicly disclosed vulnerability in Microsoft Server Message Block (SMB) Protocol. It could allow remote code execution on an affected system, but it becomes a less serious issue if the user does not have administrative rights.
Eric Schultze, CTO of Shavlik Technologies, in an e-mailed statement, said that the MS08-068 is the more interesting of the two bulletins.
"It appears that MS08-068 (Important) is addressing a vulnerability that was first made public 7+ years ago (in 2001)," said Schultze. "Sir Dystic, from Cult of the Dead Cow, found a vulnerability in Microsoft operating systems that enabled attackers complete access to user's computers. He wrote a utility called SMBRelay to demonstrate the flaw. Microsoft was aware of the issue but didn't issue any security bulletins or patches to correct the behavior. Well, it looks like they've finally seen the light and have addressed this issue via the MS08-068 patch."
Schultze said he used to demonstrate this attack at classroom training sessions around the country and that participants had been surprised that Microsoft knew about the attack but hadn't fixed it.
Tyler Reguly, security research engineer at nCircle, in an e-mailed statement, also questioned Microsoft's assertion that MS08-069 deserves to be rated as the more significant of the two bulletins.
He cited the high risk of insider threats and said that SMB redirection represents "the ultimate insider attack in today's enterprise environment, where IE is often the corporate standard and can be made to pass credentials when a user simply visits a Web page."
One reason that Microsoft may have chosen to deal with this vulnerability is that SMB redirection has been available in the Metasploit framework for several months.
"Metasploit's SMB_Relay module greatly reduces the effort required to take advantage of this attack, allowing users to set up a fake Web page pointing to a host running Metasploit and exploiting each machine," said Reguly. "This ease of attack and the fact that the attack is already easily accessible to the public may mean we see increased exploitation compared to what we would usually see."
Last month, Microsoft released an out-of-band security update to address a critical flaw that could let a remote attacker take over Windows computers without any user interaction. Microsoft said it had done so because there was active exploitation of the vulnerability.