Attacks/Breaches
3/13/2013
12:32 PM
50%
50%

Microsoft Patches For USB Key Vulnerability

Driver bug would allow anyone with physical access to compromise a PC by using exploit code loaded onto a USB storage device.

Anonymous: 10 Things We Have Learned In 2013
Anonymous: 10 Things We Have Learned In 2013
(click image for larger view and for slideshow)
Microsoft on Tuesday patched a number of vulnerabilities affecting its Windows and Mac OS X products, including one Windows bug that could be exploited by attackers to take control of a PC via a USB key.

All told, Microsoft released seven security bulletins, including four "critical" warnings -- referring to bugs that can be used to remotely compromise a PC -- involving Internet Explorer, Silverlight, Visio Viewer 2010 and SharePoint.

Security experts' consensus is to first patch IE -- all versions of the browser, from IE6 to IE10, are at risk -- because some of the eight fixed bugs could be exploited via drive-by attacks launched from compromised websites.

[ Want more on recent patches? Read Oracle, Apple Issue Java Security Patches. ]

Microsoft also released three "important" security bulletins, including fixes for bugs in Microsoft OneNote, Outlook for Mac and Windows kernel-mode drivers. The last vulnerability affects Windows XP, Vista, 7 and 8; the 2003, 2008, 2008 R2 and 2012 versions of Windows Server; and multiple versions of Server Core installations.

The kernel-mode driver vulnerabilities also enable this scary security scenario: "An attacker could own your machine by inserting a malicious USB device," said Dustin Childs, group manager for response communications for Microsoft Trustworthy Computing, in a blog post.

The issue isn't that malware can be installed on a USB-compatible storage device, but rather that by exploiting the USB driver vulnerability, an attacker wouldn't have to authenticate to a targeted PC. "While this isn't the first issue to leverage physical access and USB devices, it is different in that it doesn't require a machine to be logged on," said Childs. "It also provides kernel-level code execution where previous attacks only allowed code execution at the logged-on level. Because of this, someone with casual physical access, such as a custodian sweeping your office at night or a security guard making his rounds, could simply plug in a USB device to perform any action as an administrator."

Beyond installing the IE patches, said Childs, "this is also a good reminder for companies to include physical security in their threat modeling."

Until a business can install the patch, Andrew Storms, director of security operations at nCircle, offered a short-term fix. "The good news is you don't need to put glue in your USB ports to protect yourself," he said via email. "Either install the patch ASAP, or deploy a GPO policy to temporarily disable USB ports until the patch is completely deployed."

Microsoft also announced Tuesday that it's decided to not use its monthly "Patch Tuesday" approach for distributing Windows Store app security fixes. "We will deliver high quality security updates for Windows Store apps as they become available," said Mike Reavey, a Microsoft Trustworthy Computing senior director, in a blog post. "This applies to Microsoft apps that are installed using the Windows Store and to apps like Mail, which are preinstalled with Windows 8 but updated using the Windows Store. Providing security updates to these apps more frequently will allow us to add new functionality, fix issues and improve security. This will also help developers to avoid introducing new issues during the update process."

Reavey said that users will be able to install any updates in devices by clicking on the store tile in Windows 8, then selecting available updates. He also said Microsoft would document all fixes made, in accompanying security bulletins.

Adobe, as part of its quarterly patch release cycle, Tuesday also released security updates for Adobe Flash Player running on Windows, Mac OS X, Linux and all versions of Android.

"These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system," said Adobe's related security bulletin. The updates patch four bugs -- an integer overflow vulnerability, use-after-free vulnerability, memory corruption vulnerability, and heap buffer overflow vulnerability -- that could be exploited by an attacker to execute arbitrary code. Adobe said the risk of the vulnerability being exploited is highest for Windows systems, followed by Mac OS X, and then the Linux and Android systems.

Obviously, it's been a busy month for patching, bolstered by Mozilla and Google, which last week released patched versions of Firefox and Chrome less than 24 hours after security researchers at the Pwn2Own competition at the CanSecWest security conference demonstrated new zero-day vulnerabilities against both browsers. Although researchers also successfully exploited zero-day bugs in Adobe Flash and Reader, as well as Internet Explorer, Adobe and Microsoft have yet to release fixes for those exploits. Multiple security experts said they expect both vendors to issue related patches by next month.

The Enterprise Connect conference program covers the full range of platforms, services and applications that comprise modern communications and collaboration systems. Hear case studies from senior enterprise executives, as well as from the leaders of major industry players like Cisco, Microsoft, Avaya, Google and more. Register for Enterprise Connect 2013 today with code IWKPREM to save $200 off a conference pass or get a free Expo Pass. It happens March 18-21 in Orlando, Fla.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
FTC Opens Probe into Equifax Data Breach
Jai Vijayan, Freelance writer,  9/14/2017
Equifax CIO, CSO Step Down
Dark Reading Staff 9/15/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Jan, check this out! I found an unhackable PC.
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.