Welcome to WebmasterWorld Guest from 54.166.54.215

Forum Moderators: bill

Urgent Windows patch today

   
11:21 am on Oct 23, 2008 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



MS will be releasing a Windows patch later today. It is said to fix a remote code execution vulnerability labeled as important for Vista and critical for older versions of Windows, including XP.

[microsoft.com...]

I guess many crackers will try to reverse engineer the patch the moment it is released and that evil code may soon be used. So we'd probably all better apply the patch asap...

11:33 am on Oct 23, 2008 (gmt 0)

WebmasterWorld Senior Member beedeedubbleu is a WebmasterWorld Top Contributor of All Time 10+ Year Member



It gets released in the UK at 22.00 tonight.
11:40 am on Oct 23, 2008 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



Oh my god I am so excited! I think I will stay up all night for this.

Or maybe not on second thought...

12:35 pm on Oct 23, 2008 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



Everyone might also want to install the free "Belarc Advisor" which is better than using WindowsUpdate to check for missing security patches in my experience - it will find official patches for other Microsoft products you have installed.
12:37 pm on Oct 23, 2008 (gmt 0)

WebmasterWorld Senior Member swa66 is a WebmasterWorld Top Contributor of All Time 10+ Year Member



Considering it's an out-of-cycle patch, I'd not bet on the bad guys not already actively exploiting it. Hence no need to reverse engineer, they most likely already know and actively abuse it.
It's that or they are doing something PR minded to be able to say "already fixed".
1:21 pm on Oct 23, 2008 (gmt 0)

WebmasterWorld Senior Member kaled is a WebmasterWorld Top Contributor of All Time 10+ Year Member



Do any of these various remote-code-execution exploits work if hardware data-execution-prevention is enabled?

Kaled.

2:47 pm on Oct 23, 2008 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



Wow, there have been 5 responses and not a single self righteous mac or linux user saying you wouldn't have a problem if you used said systems. Amazing... :)
3:01 pm on Oct 23, 2008 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



haha, I think that defense has run its course.
6:09 pm on Oct 23, 2008 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



Already available for download, select your environment here:
[microsoft.com...]
8:14 pm on Oct 23, 2008 (gmt 0)

WebmasterWorld Senior Member henry0 is a WebmasterWorld Top Contributor of All Time 10+ Year Member



In the US
we may now directly get it from the regular on PC "updates"
5:01 am on Oct 24, 2008 (gmt 0)

WebmasterWorld Administrator bill is a WebmasterWorld Top Contributor of All Time 10+ Year Member Top Contributors Of The Month Best Post Of The Month



I got my XP updates about 9 hours ago, but the Vista updates just came through a few minutes ago for me.

The current advice is install them ASAP.

MS hasn't released a patch out of its scheduled Patch Tuersday cycle in a year and a half. This looks quite serious.

Microsoft Security Bulletin MS08-067 Critical [microsoft.com]

This security update resolves a privately reported vulnerability in the Server service. The vulnerability could allow remote code execution if an affected system received a specially crafted RPC request. On Microsoft Windows 2000, Windows XP, and Windows Server 2003 systems, an attacker could exploit this vulnerability without authentication to run arbitrary code. It is possible that this vulnerability could be used in the crafting of a wormable exploit. Firewall best practices and standard default firewall configurations can help protect network resources from attacks that originate outside the enterprise perimeter.

10:37 am on Oct 24, 2008 (gmt 0)

WebmasterWorld Senior Member kaled is a WebmasterWorld Top Contributor of All Time 10+ Year Member



To answer my own question, and having done a little research, my best guess is that hardware data execution prevention would NOT protect against a vulnerability of this sort.

Sometimes you have to wonder what MS programmers do all day. This problem has existed since at least Windows 2000, and I rather suspect it's a design fault not a coding error!

Kaled.

7:25 am on Oct 26, 2008 (gmt 0)

WebmasterWorld Administrator bill is a WebmasterWorld Top Contributor of All Time 10+ Year Member Top Contributors Of The Month Best Post Of The Month



New worm feeds on latest Microsoft bug [nytimes.com]

One day after Microsoft issued a rare emergency Windows security patch, the bad guys have a few new ways to take advantage of the bug.

By Friday, security researchers had identified a new worm, called Gimmiv, which exploited the vulnerability, and a hacker had posted an early sample of code that could be used to exploit the flaw on the Web.

Microsoft issued the patch more than two weeks ahead of its next security updates because the bug could be used to create an Internet worm attack and Microsoft had already seen a small number of attacks that exploited the flaw.

This vulnerability lies in the Windows Server service used to connect with other devices on networks. Although the firewall software that ships with Windows will block the worm from spreading, security experts are worried that the flaw could be used to spread infections between machines on a local area network, which are not typically protected by firewalls.

 

Featured Threads

My Threads

Hot Threads This Week

Hot Threads This Month