Vulnerabilities / Threats

5/9/2017
11:15 AM
Connect Directly
Twitter
Twitter
RSS
E-Mail
50%
50%

Microsoft Releases Emergency Patch For RCE Vuln

Flaw in Microsoft Malware Protection Engine called 'crazy bad' by researchers who discovered it.

Late last night Microsoft released an emergency out-of-band patch to fix a vulnerability in Microsoft Malware Protection Engine (MsMpEng) that one of the researchers who found it called "the worst Windows remote code exec(ution) in recent memory," and for which US-CERT released an alert.

Announced over the weekend by a pair of researchers working for the Google Project Zero team, Tavis Ormandy and Natalie Silanovich, the vulnerability allows attackers to carry out remote code execution (RCE) by feeding MsMpEng a simple malicious file to trigger memory corruption. According to Silanovich, the vulnerability only requires a simple exploit to leverage, requiring so little code that it can fit in a single tweet. According to Microsoft Security Advisory 4022344, the affected version of the engine must scan the specially crafted file, but that can be easily achieved a number of ways.

"For example, an attacker could use a website to deliver a specially crafted file to the victim's system that is scanned when the website is viewed by the user. An attacker could also deliver a specially crafted file via an email message or in an Instant Messenger message that is scanned when the file is opened," Microsoft advises. "In addition, an attacker could take advantage of websites that accept or host user-provided content, to upload a specially crafted file to a shared location that is scanned by the Malware Protection Engine running on the hosting server."

In fact, when Ormandy and Silanovich released their proof-of-concept code they warned anyone using Microsoft systems to take extra care with the file because simply downloading it could immediately crash MsMpEng in its default configuration. Given the triviality of exploit, the default-on status of MsMpEng in Windows systems from Windows 8 on up, and the permissions afforded to the service, Ormandy calls this particular hole "crazy bad."

"Vulnerabilities in MsMpEng are among the most severe possible in Windows, due to the privilege, accessibility, and ubiquity of the service," he wrote. "The core component of MsMpEng responsible for scanning and analysis is called mpengine. Mpengine is a vast and complex attack surface, comprising of handlers for dozens of esoteric archive formats, executable packers and cryptors, full system emulators and interpreters for various architectures and languages, and so on. All of this code is accessible to remote attackers."

Ormandy and Silanovich went through coordinated vulnerability disclosure procedures with Microsoft, which came up with this release within just a few days. Microsoft says that updates to the engine will be automatically installed with updated malware definitions for the affected products, such that the typical consumer end user should see the update applied within 48 hours. Consumers can speed up that timetable by manually updating their anti-malware software. Meanwhile, Microsoft advises enterprise customers to follow internal processes to confirm that their patch management software has approved and installed necessary definition and engine updates.

"Administrators of enterprise anti-malware deployments should ensure that their update management software is configured to automatically approve and distribute engine updates and new malware definitions. Enterprise administrators should also verify that the latest version of the Microsoft Malware Protection Engine and definition updates are being actively downloaded, approved and deployed in their environment," the advisory explains. 

The scramble to patch this vulnerability highlights the extreme sensitivity of flaws found within security products, say experts in the field. 

"The irony is that it is the product that is designed to protect these operating systems against malware which can now be targeted as a result of finding this issue," says Darron Gibbard, CTSO at Qualys. 

Steven Malone, director of security product management at email security company Mimecast agrees, explaining that the incident is also good lesson on why it's never good to depend on a single layer of security.

"Desktop security products often need high privileges in order to see everything and therefore any vulnerabilities can be particularly deadly," he says. "Incidents like this highlight that advanced security still requires a defense-in-depth strategy."

Related Content:

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Russia Hacked Clinton's Computers Five Hours After Trump's Call
Robert Lemos, Technology Journalist/Data Researcher,  4/19/2019
Why We Need a 'Cleaner Internet'
Darren Anstee, Chief Technology Officer at Arbor Networks,  4/19/2019
4 Tips to Protect Your Business Against Social Media Mistakes
Guy Bunker, CTO of Clearswift,  4/22/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-16558
PUBLISHED: 2019-04-25
Contao 3.0.0 to 3.5.30 and 4.0.0 to 4.4.7 contains an SQL injection vulnerability in the back end as well as in the listing module.
CVE-2018-18369
PUBLISHED: 2019-04-25
Norton Security (Windows client) prior to 22.16.3 and SEP SBE (Windows client) prior to Cloud Agent 3.00.31.2817, NIS-22.15.2.22 & SEP-12.1.7484.7002, may be susceptible to a DLL Preloading vulnerability, which is a type of issue that can occur when an application looks to call a DLL for executi...
CVE-2018-19442
PUBLISHED: 2019-04-25
A Buffer Overflow in Network::AuthenticationClient::VerifySignature in /bin/astro in Neato Botvac Connected 2.2.0 allows a remote attacker to execute arbitrary code with root privileges via a crafted POST request to a nucleo.neatocloud.com:4443/vendors/neato/robots/[robot_serial]/messages Neato clou...
CVE-2019-9135
PUBLISHED: 2019-04-25
DaviewIndy 8.98.7 and earlier versions have a Heap-based overflow vulnerability, triggered when the user opens a specific file that is mishandled by Daview.exe. Attackers could exploit this and arbitrary code execution. .
CVE-2019-9136
PUBLISHED: 2019-04-25
DaviewIndy 8.98.7 and earlier versions have a Heap-based overflow vulnerability, triggered when the user opens a malformed JPEG2000 format file that is mishandled by Daview.exe. Attackers could exploit this and arbitrary code execution.