Users login

Create an account »

JOIN XATRIX

Users login

Home » Hacking News » MS issues another critical security fix

MS issues another critical security fix

by Nikola Strahija on October 9th, 2002 Microsoft has released a patch to fix critical flaws within Windows Help Facility which could enable attackers to execute arbitrary code on a victim PC.


The HTML Help facility in Windows includes an ActiveX control which provides much of its functionality. One of the functions exposed via the control contains an unchecked buffer, Microsoft says, warning that the flaw poses a critical risk for all Windows users.

Attack mechanisms are all too familiar. The flaw could be exploited by a web page hosted on an attacker site or by a spot of social engineering and a maliciously-constructed HTML mail (although users of the latest Outlook clients and those who have applied the post-Love Bug Outlook security patch enjoy some protection from this).

Security researchers at PivX Solutions, which discovered the flaw, say the fix omits their recommendation to set the Kill Bit of the flawed ActiveX control. This effectively allows a cracker to re-introduce the vulnerable control, it argues.

A second vulnerability exists because of flaws associated with the handling of compiled HTML Help (.chm) files that contain shortcuts. Te security context of these files arent checked properly - an oversight which might allow all sorts of mischief
But this is difficult to exploit, according to Microsoft, which grades this flaw, fixed with the same patch, as a moderate risk.

That is as maybe but Windows Help vulnerabilities can be very nasty, and example of which is a flaw in Win XP - silently fixed with Service Pack 1 - which allowed a hacker to create a link that, when selected, could easily delete contents on any directory of a users PC.

Microsoft has issued four new security alerts in total. As well as the Windows help bug fix, there iss also a patch for flaws in handling file decompression. Microsoft describes this flaw, which involves the way that Windows PCs handle Zip files, as a moderate risk. The problem arises from coding mistakes which have resulted, yet again, in a buffer overflow vulnerability that could be manipulated to inject malicious code onto a users PC.

There is more information in Microsoft advisory here(http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS02-054.asp)

Redmonds other overnight advisories relate to a cumulative patch for SQL Server( http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS02-056.asp)and apparently less serious flaw involving the Services for Unix 3.0 Interix SDK(http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS02-057.asp)


Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »