Users login

Create an account »

JOIN XATRIX

Users login

Home » Hacking News » Windows extremely critical flaw unpached

Windows extremely critical flaw unpached

by Nikola Strahija on November 22nd, 2005 A security researcher made an exploit code for a bug in Internet Explorer, which allows a remote attacker to take over Windows systems (even Windows XP with Service Pack 2 installed), public.


The proof-of-concept code was developed by ComputerTerrorism, and takes advantage of an unpatched Explorer bug previously thought to be relatively harmless, allowing attackers only to crash the system.

-Contrary to popular belief, the aforementioned security issue is susceptible to remote, arbitrary code execution, yielding full system access with the privileges of the underlying user, ComputerTerrorism said in an advisory.

ComputerTerrorism said it has confirmed the bug on a fully patched system running Windows XP SP2 and Windows 2000 SP4. Explorer versions 5.5 and 6.x are affected, according to ComputerTerrorism. The firm noted that Microsoft has not yet released a fix for the bug despite the fact that the original bug was brought to the public's attention at the end of May. -To date, the vendor has failed to publicly acknowledge the presence of the flaw, or provide any timescales for an appropriate fix, ComputerTerrorism said.

The vulnerability can be exploited by tricking a user to visit a malicious website, or by embedding malicious code in a trusted site. Because Microsoft hasn't yet patched the flaw, the only reliable protection for Explorer users is to disable Active Scripting, said security researchers.

-Currently, the only way to protect against exploitation of this vulnerability is by disabling active scripting or by using another browser, said Thomas Kristensen, chief technical officer of security firm Secunia, which maintains a vulnerabilities database. -Secunia has raised the criticality of this vulnerability to Extremely Critical because working exploit code is publicly available.

Microsoft said it is investigating the issue, and may issue a patch. It also criticised ComputerTerrorism's disclosure of the bug, saying it may have made things worse. Some Windows systems aren't vulnerable to the attack, Microsoft said. -By default, Internet Explorer on Windows Server 2003, on Windows Server 2003 Service Pack 1, on Windows Server 2003 with Service Pack 1 for Itanium-based Systems, and on Windows Server 2003 x64 Edition runs in a restricted mode that is known as Enhanced Security Configuration. This mode mitigates this vulnerability, the company said.


Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »