It’s dangerous because a victim can be compromised completely (including remote code execution) just by visiting a malicious web page.
Five days after it was disclosed in a highly controversial advisory, a critical vulnerability in Microsoft’s Windows XP operating system is being exploited by criminal hackers, researchers from anti-virus provider Sophos said on Tuesday.
The flaw in the Windows Help and Support Center was disclosed on Thursday by researcher Tavis Ormandy. His public advisory came just five days after he privately informed Microsoft of the defect, prompting fierce criticism from some circles that he hadn’t given the software giant adequate time to fix the hole. That made it easier for attackers to target the bug, which allows attackers to take complete control of vulnerable machines when a user views a specially designed webpage, the critics howled.
According to Sophos, researchers have seen the first case of a website using the vulnerability to install malicious software on victim machines. “This malware downloads and executes an additional malicious component (Troj/Drop-FS) on the victim’s computer, by exploiting this vulnerability,” they warned.
Well there’s some discussion on the issue going on about responsible disclosure with people saying Tavis made the advisory public too quickly after informing Microsoft. It’s a fair comment considering Microsoft and it’s Patch Tuesday policy which limits the speed in which they can push patches out.
We all know how often Microsoft pushes out-of-bound patches out, very rarely if at all.
Add the fact that Windows XP is coming to the end of it’s life-cycle soon, it’s unlikely they are going to be scrambling to get a patch out.
Microsoft soon amended its own advisory on the vulnerability to say researchers are “aware of limited, targeted active attacks that use this exploit code.” Although the vulnerability also afflicts Windows Server 2003, Microsoft’s advisory said that OS wasn’t “currently at risk from these attacks.”
Ormandy’s advisory has reignited the age-old debate over full disclosure, in which researchers publish complete details of a vulnerability under the belief that it is the best way to ensure a company fixes it quickly. Ormandy has defended his decision to give Microsoft just five days of advanced warning saying in a recent tweet: “I’m getting pretty tired of all the ‘5 days’ hate mail. Those five days were spent trying to negotiate a fix within 60 days.”
Users of XP and Server 2003 should consider disabling features within Help Center that allow administrators to remotely log onto machines.
Oh well, the debates about disclosure will rage on I guess, either way it’s out there now and it’s being exploited in the wild – so as of now it’s a real risk.
For individual users you can use the online application from Microsoft here:
Source: The Register
- GHOST Vulnerability In glibc – Everything You Need To Know
- Flash Zero Day Being Exploited In The Wild
- OpenVAS 7 Released – Open Source Vulnerability Scanner
- Windows XML Core Services Exploit Attacked In The Wild – CVE-2012-1889
- Microsoft Word 0-day Exploits – QUESTION.DOC
- Microsoft Rushes Out Critical RPC Bug Fix
Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 229,288 views
- AJAX: Is your application secure enough? - 119,368 views
- eEye Launches 0-Day Exploit Tracker - 85,188 views