About | ACP | Buy | Industry Watch | Learning Curve | News | Search | Test
Home » Industry Watch

MS ActiveImelda®

Security pundits held their breath (and laughed) when Windows XP Service Pack 2 with 'advanced security technologies' [sic] was released.

There were few risks the product would be worse than its predecessor, but few hopes things finally changed in what the renowned CSIS calls 'a system that cannot be fixed'. All that remained was to wait for 'the other shoe'.

It's not been many months at all, but the question of a single 'other shoe' is already today taking on the spectre of the wardrobe of Imelda Marcos.

CNET's Dawn Kawamoto reported today on the heightened security warning of security corporation Secunia, now that exploit code for three very dangerous flaws in Service Pack 2 have been published.

Affecting Internet Explorer 6.0, the exploits enable malfeasants to place and execute code on the victims' computers without their knowledge. Some of the worst types of 'plants' include spyware and 'porn-dialers' (programs which silently disconnect a computer from the Internet and then dial up an extremely expensive connection, all without the victim noticing an interruption in service).

The GreyHats Security Group published the code for one of these exploits already on 21 December 2004 - it blew through a hole in the SP2 HTML help system.

Secunia's CTO Thomas Kristensen explained why his firm now elevates the risk rating to 'extremely critical', their highest possible rating.

'In order for us to rate a vulnerability as extremely critical, there has to be a working exploit out there that doesn't require user interaction. This is our highest rating and is the last warning for users to fix their systems.'

It must be reiterated that this exploit indeed works with Windows XP Service Pack 2 with its 'advanced security technologies'.

Secunia recommend using another browser and/or disabling ActiveX until Microsoft find a fix.

There's yet another hole however: Windows 'drag-drop' exposes it. The hole was first reported last October, only weeks after the release of SP2. Secunia and others are now taking it seriously as well.

Says Kristensen:

'Microsoft knew of this back in October. In my opinion it's not fair to have a vulnerability known for two months without having an available patch, especially when every detail is out there.'

Microsoft on their end claim it takes 'extensive work' to find a way to patch the holes, and in the meantime recommend users read their 'safe browsing guidelines' which coincidentally do not directly advocate abandoning their own software for consistently greener pastures.

Kawamoto notes the Secunia rating escalation is 'another setback in Microsoft's efforts to shore up its security' and reminds readers that 'when Microsoft launched SP2 in August [2004], Chairman Bill Gates touted it as a significant step in shoring up systems against attacks'.

About | ACP | Buy | Industry Watch | Learning Curve | News | Products | Search | Substack
Copyright © Rixstep. All rights reserved.