[Vision2020] another serious Windows security flaw
Mark Solomon
msolomon at moscow.com
Fri Dec 30 07:36:23 PST 2005
typing happily away on my Mac,
Mark Solomon
********
Windows Security Flaw Is 'Severe'
PCs Vulnerable to Spyware, Viruses
By Brian Krebs
Special to The Washington Post
Friday, December 30, 2005; D01
A previously unknown flaw in Microsoft Corp.'s
Windows operating system is leaving computer
users vulnerable to spyware, viruses and other
programs that could overtake their machines and
has sent the company scrambling to come up with a
fix.
Microsoft said in a statement yesterday that it
is investigating the vulnerability and plans to
issue a software patch to fix the problem. The
company could not say how soon that patch would
be available.
Mike Reavey, operations manager for Microsoft's
Security Response Center, called the flaw "a very
serious issue."
Security researchers revealed the flaw on Tuesday
and posted instructions online that showed how
would-be attackers could exploit the flaw. Within
hours, computer virus and spyware authors were
using the flaw to distribute malicious programs
that could allow them to take over and remotely
control afflicted computers.
Unlike with previously revealed vulnerabilities,
computers can be infected simply by visiting one
of the Web sites or viewing an infected image in
an e-mail through the preview pane in older
versions of Microsoft Outlook, even if users did
not click on anything or open any files.
Operating system versions ranging from the
current Windows XP to Windows 98 are affected.
An estimated 90 percent of personal computers run
on Microsoft Windows operating systems. Microsoft
has found itself under attack on several
instances and has been forced to issue a number
of patches to keep computers running Windows
safe. Mac and Linux computer users are not at
risk with this attack, even if their computers
run Microsoft programs such as Office or the
Internet Explorer Web browser.
Reavey encouraged users to update their
anti-virus software, ensure all Windows security
patches are installed, avoid visiting unfamiliar
Web sites, and refrain from clicking on links
that arrive via e-mail or instant message.
"The problem with this attack is that it is so
hard to defend against for the average user,"
said Johannes Ullrich, chief research officer for
the SANS Internet Storm Center in Bethesda.
At first, the vulnerability was exploited by just
a few dozen Web sites. Programming code embedded
in these pages would install a program that
warned victims their machines were infested with
spyware, then prompted them to pay $40 to remove
the supposed pests.
Since then, however, hundreds of sites have begun
using the flaw to install a broad range of
malicious software. SANS has received several
reports of attackers blasting out spam e-mails
containing links that lead to malicious sites
exploiting the new flaw, Ullrich said.
Dean Turner, a senior manager at anti-virus firm
Symantec Corp. of Cupertino, Calif., said the
company has seen the vulnerability exploited to
install software that intercepts personal and
financial information when users of infected
computers enter the data at certain banking or
e-commerce sites.
Eric Sites, vice president of research and
development for anti-spyware firm Sunbelt
Software, said he has spotted spyware being
downloaded to a user's machine by online banner
advertisements.
"Pretty much all of the spyware guys who normally
use other techniques for pushing this stuff down
to your machine are now picking this exploit up,"
Sites said.
Because the vulnerability exists within a faulty
Windows component, security experts warn that
Windows users who eschew Internet Explorer in
favor of alternative Web browsers, such as older
versions of Firefox and Opera, can still get
their PCs infected if they agree to download a
file from a site taking advantage of the flaw.
Richard M. Smith, a Boston security and privacy
consultant, said he was particularly worried that
the vulnerability could soon be used to power a
fast-spreading e-mail worm.
"We could see the mother of all worms here,"
Smith said. "My big fear is we're going to wake
up in the next week or two and have people
warning users not to read their e-mail because
something is going around that's extremely
virulent."
Brian Krebs is a washingtonpost.com reporter.
© 2005 The Washington Post Company
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mailman.fsr.com/pipermail/vision2020/attachments/20051230/e659cd5c/attachment.htm
More information about the Vision2020
mailing list