Bruce Sterling on Thu, 11 Sep 2003 16:30:20 +0200 (CEST) |
[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
<nettime> Here comes the next MSBlaster |
*Normally I wouldn't trouble nettime with boring, everyday comp-security alerts, but that Blaster worm was created so quickly that I estimate you have about 28 days tops before every unpatched Windows-user you know gets whacked by an exploit of this thing. *Here are your choices, Windows users: 1. Do nothing; get repeatedly infected and trampled by a planetfull of increasingly well-organized virus-phreak malcontents 2. Give Bill Gates the free, unilateral run of your system by installing "Windows Auto Update" 3. Spend all your own free time patching, ie sticking fingers into the dike and dodging the crossfire. 4. Get Linux or a Mac. *This is a quagmire. It's gonna get a lot worse before it gets better, if it ever gets better at all -- bruces From: Dave Farber <dave@farber.net> Date: Wed Sep 10, 2003 04:05:24 PM US/Central To: ip@v2.listbox.com Subject: [IP] *Another* critical Windows flaw Reply-To: dave@farber.net http://money.cnn.com/2003/09/10/technology/microsoft_flaw.reut/index.htm?cnn= yes Microsoft warns of new Windows flaw Software maker says security flaw is similar to one that hackers exploited to create Blaster worm. September 10, 2003: 4:01 PM EDT SAN FRANCISCO (Reuters) - Microsoft Corp. warned computer users Wednesday about a new critical security hole in its Windows operating system that could allow an attacker to gain control over a computer, delete data and install unwanted programs. The vulnerability is similar to one that Microsoft warned about in July, which experts called one of the worst to hit a software program in years because of the broad number of Windows systems affected. Within a month, the Blaster Internet worm surfaced, taking advantage of that security hole in Windows. The worm eventually infected an estimated hundreds of thousands of machines. Hackers apparently have not yet targeted the newly announced vulnerability, said Jeff Jones, senior director of Trustworthy Computing security at Redmond, Wash.-based Microsoft. But with any critical flaw, "we have a worry that history has shown us there are malicious individuals out there that could create an attack of some sort against it," he said. Blaster, also dubbed MSBlast and LovSan, crashed many of the computers it infected and tried to launch an unsuccessful attack on a Microsoft software download Web site. The operating systems affected by the latest security vulnerabilities are Windows NT 4.0, Windows 2000, Windows XP and Windows Server 2003. Older versions of Windows, including Windows Millennium, Windows 98 and Windows 95, are not affected, the company said. Both the software flaw targeted by the Blaster worm and the new security hole are related to the Distributed Component Object Model service that is hosted by a Remote Procedure Call feature in Windows. Those features allow software applications to work with each other across a computer network. Instant replay "It's pretty much like instant replay," said Marc Maiffret, chief hacking officer at eEye Digital Security, which discovered the latest critical flaw. "I can't even imagine the frustration level administrators will be feeling today," he said. There are critical Windows flaws occasionally, but "never before have we had another one so soon," he said, adding that he thinks there is a good chance there will be another worm that will exploit the new flaw. Since early last year, Microsoft has made software security a top priority in an attempt to address rising customer concerns about the spread of viruses and hacker attacks. Last week Microsoft warned of an important flaw in its Office software that could enable a malicious programmer to create documents that would launch attacks on unsuspecting users. There have been about 40 warnings from Microsoft of security flaws, rated either critical, important, moderate and low, since the beginning of this year, according to data posted at the Microsoft security bulletin Web site. Last year, there were a total of 72 bulletins issued, Jones said. Jones advised Windows users to get information and download a patch that fixes the critical vulnerabilities, as well as other less-serious ones the company discovered. The patch is available from <http://www.microsoft.com/ security>www.microsoft.com/security. Microsoft is also urging customers to install a firewall to block out intruders and enable the Windows auto update feature, which allows security and other software to be updated and installed automatically. The Web site for that is <http://www.microsoft.com/protect>www.microsoft.com/protect. Microsoft credited outside researchers for finding the new critical and non-critical vulnerabilities. Besides eEye Digital Security, it named NSFOcus Security Team, and Xue Yong Zhi and Renaud Deraison from Tenable Network Security as contributors. <http://cnnmoney.printthis.clickability. com/pt/#TOP> # distributed via <nettime>: no commercial use without permission # <nettime> is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: majordomo@bbs.thing.net and "info nettime-l" in the msg body # archive: http://www.nettime.org contact: nettime@bbs.thing.net