Spyware Sucks
“There is no magic fairy dust protecting Macs" – Dai Zovi, author of “The Mac Hacker’s Handbook"

ALERT: Please install critical out-of-band security patch

October 23rd 2008 in Uncategorized

matrix3 

Edit: A detailed description of the vulnerability has been published here:
http://blogs.technet.com/swi/archive/2008/10/23/More-detail-about-MS08-067.aspx 

Of particular importance is this quote:

This is a serious vulnerability and we have seen targeted attacks using this vulnerability to compromise fully-patched Windows XP and Windows Server 2003 computers so we have released the fix “out of band” (not on the regular Patch Tuesday).

We’re all patched – I strongly recommend you ensure all of your computers are patched too.

Details here:
http://www.microsoft.com/technet/security/bulletin/ms08-067.mspx

This security update resolves a privately reported vulnerability in the Server service. The vulnerability could allow remote code execution if an affected system received a specially crafted RPC request. On Microsoft Windows 2000, Windows XP, and Windows Server 2003 systems, an attacker could exploit this vulnerability without authentication to run arbitrary code. It is possible that this vulnerability could be used in the crafting of a wormable exploit. Firewall best practices and standard default firewall configurations can help protect network resources from attacks that originate outside the enterprise perimeter.

This security update is rated Critical for all supported editions of Microsoft Windows 2000, Windows XP, Windows Server 2003, and rated Important for all supported editions of Windows Vista and Windows Server 2008. For more information, see the subsection, Affected and Non-Affected Software, in this section.

The security update addresses the vulnerability by correcting the way that the Server service handles RPC requests. For more information about the vulnerability, see the Frequently Asked Questions (FAQ) subsection for the specific vulnerability entry under the next section, Vulnerability Information.

Recommendation. Microsoft recommends that customers apply the update immediately.

Known Issues. None

 

Note that even the Windows 7 Pre-Release beta is affected, although it should be noted that only authenticated users are affected.

Mitigations:

  • Firewall best practices and standard default firewall configurations can help protect network resources from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed.
  • On Windows Vista and Windows Server 2008, the vulnerable code path is only accessible to authenticated users. This vulnerability is not liable to be triggered if the attacker is not authenticated.

3 comments to...
“ALERT: Please install critical out-of-band security patch”

Doug Woodall

Thanks for the info Sandi,

I know Im looking forward to the new series of crashes after I do the install.

Its become common when using Vista in my experience.



sandi

Hi Doug,

So far I’ve installed the patch on:

an SBS2003 server
1 x XP SP3 desktop
1 x XP SP3 laptop
1 x Vista x64 laptop
2 x Vista x86 laptop

I haven’t seen any problems.

Sandi.



Doug Woodall

Thats good news Sandi,
Thanks.


Quote: Microsoft is scheduled to release a security bulletin (out-of-band) to address a vulnerability in all currently supported versions of Windows. The bulletin is scheduled for release at approximately 10 A.M. Pacific Time on Thursday, October 23, 2008. This security update will be released outside of the usual monthly security bulletin release cycle in […]

Previous Entry

  Here’s the Press Release:http://www.prweb.com/releases/2008/10/prweb1504344.htm An Esthost representative also posted a message to NANOG a while back – as far as I know, there was only one public response:http://www.gossamer-threads.com/lists/nanog/users/109300 Do I believe that Estdomains/Esthost are innocent victims?  Nah… too much has happened for too long.  Let’s not forge these Washington Post articles: Part […]

Next Entry

Archives