Researchers have already reported the vulnerability in the Windows Help and Support Center feature that comes with Windows XP and Windows Server 2003. Experts say at least three exploits of this flaw have already been spotted in the wild.
"This vulnerability could allow remote code execution if a user views a specially crafted Web page using a Web browser or clicks a specially crafted link in an e-mail message," Microsoft says. "The vulnerability cannot be exploited automatically through e-mail. For an attack to be successful, a user must click a link listed within an e-mail message."
Microsoft also issued a patch for another previously disclosed vulnerability, this one in the Canonical Display Driver (cdd.dll). "Although it is possible that the vulnerability could allow code execution, successful code execution is unlikely due to memory randomization," Microsoft says. "In most scenarios, it is much more likely that an attacker who successfully exploited this vulnerability could cause the affected system to stop responding and automatically restart."
Microsoft also revealed two previously undisclosed vulnerabilities in its Microsoft Office Access ActiveX Controls. "The vulnerabilities could allow remote code execution if a user opened a specially crafted Office file or viewed a Web page that instantiated Access ActiveX controls," the software giant says. "Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights."
A fourth vulnerability, which Microsoft rated as "important," affects Outlook. The flaw "could allow remote code execution if a user opened an attachment in a specially crafted email message using an affected version of Microsoft Office Outlook," the company says. "An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights."
The Windows Support flaw drew controversy last month when it was revealed by Google researcher Tavis Ormandy before Microsoft had developed a patch.
"McAfee Labs has seen malware in the wild that exploits this zero-day vulnerability," says Dave Marcus, research and communications director for McAfee Labs. "Security researchers need to work closely with software vendors to ensure vulnerabilities are patched in the most expedient method and time line possible, without putting users at risk."
Several observers say this Patch Tuesday is significant because it marks the end of support for two older operating systems, Windows 2000 and Windows XP SP2.
"This may seem like a light patch month in the amount of effort required by administrators to protect their networks, but all administrators could have quite a workload as Windows 2000 and Windows XP SP2 have officially reached end of life support," says Jason Miller, data and security team manager at Shavlik Technologies.
Marcus agrees. "Many enterprises and consumer users still deploy and depend heavily on applications that run on this [older] Windows build," he says. "It is unclear how much risk and expense the end of support will cause users worldwide, but we expect cybercriminals to capitalize on this opportunity."
Joshua Talbot, security intelligence manager for Symantec Security Response, says Microsoft may have underrated the Outlook flaw.
"Microsoft didn't rate the Outlook SMB attachment vulnerability as critical, but we think it's likely to be exploited," he says. "It appears fairly simple for an attacker to figure out and create an exploit for, which could cause executable file email attachments, such as malware, to slip past Outlook's list of unsafe file types. A user would still have to double-click on the attachment to open it, but if they do, the file would run without any warning.
"A possible scenario could involve a targeted attack against an organization," Talbot says. "A user could get a socially engineered email with a malicious attachment disguised as something innocuous. Once convinced to click on the attachment, nothing would appear to happen. The user might delete the message and move on, assuming the file to be corrupted. In reality, malware was secretly installed on their machine."
Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.