Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

Microsoft Security Vulnerability Disclosed

A Google security researcher revealed the flaw; Microsoft may release out-of-cycle fix.

Microsoft was left racing to patch a Windows Help and Support Center vulnerability after Tavis Ormandy, an information security researcher who's charged with keeping Google's products secure, Thursday publicly disclosed both the bug as well as proof-of-concept attack code.

Ormandy reportedly informed Microsoft of the vulnerability on Saturday, June 5, and Microsoft acknowledged receipt the same day. Five days later, however, Ormandy went public with a posting to the Full Disclosure mailing list. Later that day, Microsoft issued its own vulnerability announcement.

The vulnerability affects at least Windows XP and Windows Server 2003. Potentially any software using or linking to the Help Center -- including e-mail and Word documents -- is an attack vector, and users might not even notice they'd been attacked.

"Perhaps the only unavoidable signal would be the momentary appearance of the Help Center window before the attacker hides it," disclosed Ormandy. "There are multiple, trivial techniques that can be used to accomplish this."

In its vulnerability announcement, Microsoft said that it was "aware that proof of concept exploit code has been published for the vulnerability" but that it had so far not seen "active attacks that use this exploit code." The company said it would issue an out-of-cycle security patch, if required. Until then, as a workaround, it released instructions for disabling the HCP Protocol. As a side effect, however, this would break all links to the Help Center on a PC.

This is not the first bug to be spotted by Ormandy, who also serves as co-lead of the Gentoo Linux security team, or the first vulnerability announcement he's made outside of back channels. In January, he disclosed a vulnerability -- as well as a workaround -- against a 17-year-old bug in Windows, noting at the time that he chose to publish immediately, instead of waiting for Microsoft to issue a patch. In the past, he's also discovered flaws in Gentoo Linux as well as Sun's Java.

His reasoning for going public with this bug, rather than waiting for Microsoft to fix it? "I would like to point out that if I had reported the MPC::HexToNum() issue without a working exploit, I would have been ignored," he wrote in the vulnerability disclosure. Furthermore, he said, disclosing the bug now would help provide a more rapid way to mitigate the threat.

Too often, he said, "those of us who work hard to keep networks safe are forced to work in isolation without the open collaboration with our peers that we need, especially in complex cases like this, where creative thinking and input from experts in multiple disciplines is required to join the dots."

Some, however, have questioned the timing. "Five days' notice for Microsoft to fix the problem hardly seems like a reasonable amount of time to me," said Graham Cluley, a security researcher at Sophos. "Although Ormandy states in his Full Disclosure post that he does 'not speak or represent anyone but myself,' it's no surprise that some are wondering whether this was a responsible way for a Google employee to behave."

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
7 Tips for Infosec Pros Considering A Lateral Career Move
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2020
For Mismanaged SOCs, The Price Is Not Right
Kelly Sheridan, Staff Editor, Dark Reading,  1/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment:   It's a PEN test of our cloud security.
Current Issue
IT 2020: A Look Ahead
Are you ready for the critical changes that will occur in 2020? We've compiled editor insights from the best of our network (Dark Reading, Data Center Knowledge, InformationWeek, ITPro Today and Network Computing) to deliver to you a look at the trends, technologies, and threats that are emerging in the coming year. Download it today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7245
PUBLISHED: 2020-01-23
Incorrect username validation in the registration processes of CTFd through 2.2.2 allows a remote attacker to take over an arbitrary account after initiating a password reset. This is related to register() and reset_password() in auth.py. To exploit the vulnerability, one must register with a userna...
CVE-2019-14885
PUBLISHED: 2020-01-23
A flaw was found in the JBoss EAP Vault system in all versions before 7.2.6.GA. Confidential information of the system property's security attribute value is revealed in the JBoss EAP log file when executing a JBoss CLI 'reload' command. This flaw can lead to the exposure of confidential information...
CVE-2019-17570
PUBLISHED: 2020-01-23
An untrusted deserialization was found in the org.apache.xmlrpc.parser.XmlRpcResponseParser:addResult method of Apache XML-RPC (aka ws-xmlrpc) library. A malicious XML-RPC server could target a XML-RPC client causing it to execute arbitrary code. Apache XML-RPC is no longer maintained and this issue...
CVE-2020-6007
PUBLISHED: 2020-01-23
Philips Hue Bridge model 2.X prior to and including version 1935144020 contains a Heap-based Buffer Overflow when handling a long ZCL string during the commissioning phase, resulting in a remote code execution.
CVE-2012-4606
PUBLISHED: 2020-01-23
Citrix XenServer 4.1, 6.0, 5.6 SP2, 5.6 Feature Pack 1, 5.6 Common Criteria, 5.6, 5.5, 5.0, and 5.0 Update 3 contains a Local Privilege Escalation Vulnerability which could allow local users with access to a guest operating system to gain elevated privileges.