Jump to content

Hackers Crack Latest Windows Flaw


Guest Grim Reaper
 Share

Recommended Posts

Guest Grim Reaper

Computer code that exploits a critical new software vulnerability in the Windows XP and Windows 2000 operating systems is circulating on the Internet, according to security experts.

Two examples of "exploit" code for a buffer overrun in the Windows Workstation Service were posted to security-related Internet discussion groups on Friday and Saturday. Both exploits have been tested and work, according to Dan Ingevaldson, director of X-Force at Internet Security Systems.

The Workstation Service vulnerability was disclosed by Microsoft in Security Bulletin MS03-049, which was released on November 11.

The service is turned "on" by default in Windows 2000 and Windows XP systems and allows computers on a network to connect to file servers and network printers, Microsoft said.

Both the CERT Coordination Center at Carnegie Mellon University and ISS issued advisories last week regarding the Workstation Service vulnerability, warning that it was easy to exploit and well suited to use by self-spreading Internet worms.

Flawed Code

One version of the exploit code is attributed to somebody using the online name "wirepair," and was first published in a private online forum at Russian security site forum.securitylab.ru, Ingevaldson said. A second exploit, dated November 14, appeared on the French language hacking Web site www.k-otik.net by someone using the online name "snooq."

The two pieces of code are early attempts to exploit the MS03-049 vulnerability and contain multiple bugs that make them difficult to run. Because of flaws in the way the code authors attempt to trigger the buffer overrun in the Workstation Service, attackers have only one chance to compromise vulnerable Windows systems, which crash when the exploit is not successful, Ingevaldson said. Those faults make the code ill-suited to use in an Internet worm, he said.

"You need exploits that are robust and that work all the time to make an effective worm," Ingevaldson said.

More to Come?

However, virus writers and hackers worldwide will work diligently to refine the exploit code, finding ways to get the code to stop crashing systems and work on all versions of Windows XP and 2000, Ingevaldson said. Such a pattern of refinement preceded the release of the Blaster and Nachi worms in August, Ingevaldson said.

In addition, the two exploits that were publicly released might not be the only exploits for MS03-049 that have been created, he said. "[Exploits are] like cockroaches. If you see one or two, there are probably others as well," Ingevaldson said.

ISS encourages Windows users to download and apply the software patch for the Workstation Service on Windows XP and 2000 machines as soon as possible, he said.

PCWorld.com

Link to comment
Share on other sites

Hello guys, Dark Knight here, i have not been around for a week or so i have been Working in Houston,But i just wanted to say thanks to Boris, MArk and the host of other peeps who were so kind as to help me with my Spyware and hijakced Homepage problem.Since my request for help and the responses that followed i have been successful at removing the problem and my hijacked homepage is no longer "under siege" I will reccomend this forum to any friends who may have a problem or just want some really sound advice THANKS!!!! :thumbup:

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

 Share

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue. Privacy Policy