Warning: reset() expects parameter 1 to be array, null given in /home/designdi/public_html/funs.php on line 77

Warning: Variable passed to each() is not an array or object in /home/designdi/public_html/funs.php on line 77

Warning: reset() expects parameter 1 to be array, null given in /home/designdi/public_html/funs.php on line 78

Warning: Variable passed to each() is not an array or object in /home/designdi/public_html/funs.php on line 78

Warning: reset() expects parameter 1 to be array, null given in /home/designdi/public_html/funs.php on line 79

Warning: Variable passed to each() is not an array or object in /home/designdi/public_html/funs.php on line 79
WebSite, Design and Web Hosting News - Hackers Quickly Target Newly Disclosed Microsoft Flaw
Web Design Directory

  w   w   w   .   d   e   s   i   g   n   d   i   r   .   n   e   t
An industry leading web design, hosting and development directory. We bring together the best web designers and their customers. Find the lates website business news and updates.
Search DesingnDIR
Advertising | Submit Site »
   » Home Page / Industry News  
  Find Services Provider       Technology Stories        WebSite Services   
Hackers Quickly Target Newly Disclosed Microsoft Flaw

2005-02-10 13:09:00

It didn't take hackers long to start banging hard on the vulnerabilities Microsoft disseminated Tuesday.

Just a day after the Redmond, Wash.-based developer rolled out a dozen advisories containing 16 vulnerabilities, 10 of them tagged as "Critical," exploit code has gone public for one, Microsoft said late Wednesday.

"Microsoft won't be happy that someone has posted information about how to take advantage of their critical security hole within 48 hours of their patch being released," said Graham Cluley, senior technology consultant for Sophos, in a statement.

"Many computer users are bound to have not yet defended themselves," he added.

Microsoft posted an online advisory to its Web site, confirming that exploit code exists. "Microsoft is aware of exploit code available on the Internet that targets an issue addressed this week by the update released with Microsoft Security Bulletin MS05-009," Microsoft said.

The bulletin in question patched two vulnerabilities, one in Windows Media Player, the other in MSN Messenger and Windows Messenger, Microsoft's instant messaging clients. All three applications can be attacked using malformed PNG image files.

According to other security firms' analyses, the exploit code -- dubbed Exploit-PNGfile by McAfee -- can instruct the infected machine to run any payload the hacker bundles with it. Possible payloads could include such typical malware as Trojans, backdoor components, or worms to wrench control from the real user, or even spyware such as key loggers to steal information and identities.

Although exploit code is out and about, Microsoft said it had not yet seen any actual attack. "We will continue to actively monitor the situation and provide updated customer information and guidance as necessary," the advisory continued.

Microsoft said that patched systems were immune from the exploit, and outlined recommended steps for both individuals and enterprises that included updating both Windows and MSN Messenger for the former, and either uninstalling MSN Messenger or blocking it in the latter.

"MSN Messenger is not intended for corporate environments," Microsoft said. "Instead, use Windows Messenger, which is included with Windows."

Another option is to download the beta of MSN Messenger 7, which is not susceptible to the exploit.

One stumbling block in eliminating this vulnerability is that users must update MSN Messenger manually, since it's not part of Windows per se (unlike Windows Messenger, the similar-but-not-identical IM client bundled with the OS).

"Although there is an automatic update notification system present in MSN Messenger, it can take a long time for it to actually inform the user about a newer version," wrote Kaspersky Labs in its alert on the issue.

Core Security Technologies, the Boston security firm which first found the flaw and reported it to Microsoft in August 2004, said that the MSN Messenger bug was extremely dangerous.

"Due to the particular characteristics of the MSN Messenger communications protocol, exploitation of the vulnerability is likely to pass unnoticed to network Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), and firewalls that do not implement decoding and normalization of the MSN Messenger protocol encapsulated within HTTP," the company said in its own advisory posted Tuesday.

Core also said that exploits could be crafted that would compromise unpatched machines "without crashing or disrupting the normal functioning of the MSN Messenger client application," making detection almost impossible by the end user.

"This vulnerability is serious," said Sophos' Cluley. "Everyone should ensure their systems are properly protected with the security patch at the earliest opportunity."

Making It Easier To Know When To Sell Fleet Cars

HP's Software Strangles Worms

Online Auctions Open For Home Buyers, Stadium-Namers

Mobile Phone Users Buying Up Porn-On-The-Go

IBM Sees Hackers Going Mobile, Targeting Phones, Handhelds, Cars

Macromedia Partners With Nokia

Microsoft Tries To Head Off MSN Messenger Attack

Child Pornography: The Pain Behind The Pictures

Security Tops Agenda For RSA Conference

Child Pornography: Should Google Filter Its Image Database?



   
» Web Hosting Interviews
Web Hosting interviews, news and reviews. Compare the Best web hosting providers.
» Daw - Web Hosting Blog
Views and Comments about Hosting Industry. News, Trends, Products and Sevices.
» Your WebSite Here
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371


» Submit your site to Web Design Directory

About Us | Advertising | Privacy | Terms Of Use | Contact Us

© DesignDIR.net 2003 - 2017, part of of Business Address Network. All Rights Reserved!