Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Microsoft knew of nasty IE bug a year before attacks
The Register ^ | 9 July 2009 | Dan Goodin

Posted on 07/09/2009 10:54:54 AM PDT by ShadowAce

Microsoft was aware of a critical vulnerability in an Internet Explorer component at least 12 months before attackers started targeting it in lethal exploits that take full control of end-users' PCs, a member of its security team said Wednesday.

The disclosure comes as attacks targeting the MSVidCtl ActiveX control vulnerability have increased exponentially. On Monday, online ads distributed by through the Giant Realm network on popular gaming websites began including code that exploits the bug, according to security firm ScanSafe. The ads mean that anyone using IE to browse sites such as diii.net and incgamers.com are risk if they run the XP or 2003 versions of Windows and have not yet installed a quick fix.

(A spokeswoman for Giant Realm said she was looking into ScanSafe's report. She didn't get back to us by time of publication).

As reported earlier by IDG News and Dark Reading, Microsoft was alerted to the flaw in 2008. This occurred around April or May, The Register has finally determined.

The company didn't issue an advisory and temporary fix until Monday, a day after reports first surfaced that the vulnerability was being exploited in the wild. (To be fair, it took Apple until last month to fix a critical vulnerability in Mac versions of the Java virtual machine, six months after Windows versions were patched).

Mike Reavey, director of the Microsoft Security Response Center, said there are some very good reasons why the company waited so long, and one of the security researchers who discovered the bug concurs. More on that in a moment. But for others in the security industry, the delay is troubling because it may have given attackers a leg up.

"Whenever there is a zero day, the big concern is that other attackers will adopt it for their own purposes, and that's exactly what's happened here," Mary Landesman, senior security researcher at ScanSafe, told The Register. "And they were pretty quick to do it, because this was a day after the zero-day exploit became widely known."

Rogue ads on gaming sites are by no means the only place where the vulnerability is being exploited. Google searches such as this one suggest there may be close to 3 million compromised webpages that redirect users to a malicious site targeting the exploit. That's a massive increase from just a few days ago, when the number of compromised websites was believed to be in the thousands.

Microsoft's Reavey defended the decision to withhold an advisory until Monday, explaining that any fix must meet a demanding balancing act that ensures it is thorough enough to block a wide variety of related attacks while narrow enough that it doesn't cripple crucial parts of the software.

"Not every issue is the same as far as the level of work we need to do to be comprehensive in making sure we fix not just the issue reported to us but any similar issues," he said. "If we release an update that breaks apps it doesn't protect anybody because they won't install it."

The fix Microsoft issued Monday kills 49 CLSIDs related to the vulnerable ActiveX control (for a video feature known as DirectShow), 48 more than are currently being targeted, Reavey said. At the same time, Microsoft engineers "had to make sure that we didn't unintentionally kill something that did have a known use."

Reavey went on to say the timing of the advisory "is not so much a coincidence as we we have been working on it since 2008 and these attacks cover some of that work and so we were able to move fast and address what we know bad buys are using right now."

His comments lay out the awesome responsibility that comes when you're the maker of an overwhelmingly dominant operating system and you find critical vulnerabilities in it. Issue a fix too soon and you make matters worse. Spend a year investigating, as Microsoft did in this case, and attackers may flood the world with exploits before you get a chance to issue a patch through normal channels.

That's too bad because many of the pages preying on the exploit reside on well-trafficked websites, mostly operated by legitimate organizations based in China. Some researchers are comparing the DirectShow vulnerability to the one that touched off the Conficker worm, believed to have compromised millions of Windows PCs. Both have the ability to infect a large base of users quickly, they warn.

A year to investigate a bug that later turns out to be easily exploitable seems like a long time to us. These attacks have been under way since early June, according to security experts. Had the company been able to push out a fix during its regular patch cycle, it would have prevented the exploitation of untold numbers of Windows users who did nothing more than browse to the wrong website.

But that's not how Ryan Smith, one of the researchers who discovered the bug, sees things.

"The actual mechanics of the vulnerability aren't standard and that's kind of what took Microsoft so long," he said in an interview. "They were definitely working diligently to fix the problem. It was more the nature of the flaw that took so much time."

Smith, who now works for security firm iDefense, says he's not at liberty to discuss the specifics of the bug, although he says there will be additional details offered during a talk he and two other researchers plan to give later this month at the Black Hat security conference in Las Vegas.

What he can say is that he received regular updates from Microsoft throughout that time.

"They're one of the best vendors to work with," he said. "A lot of vendors won't give you any information. Microsoft was very forthcoming with the details."

What shouldn't get lost in this controversy is the simple fact that now, no one has to be bitten by this ugly bug. If you use any flavor of Windows XP or Windows Server 2003, you should immediately hit this link and click on the Fix it icon to enable a workaround. It's quick, painless and crucial, given all the time that's already been lost. ®


TOPICS: Business/Economy; Technical
KEYWORDS: microsoft; security

1 posted on 07/09/2009 10:54:54 AM PDT by ShadowAce
[ Post Reply | Private Reply | View Replies]

To: rdb3; Calvinist_Dark_Lord; GodGunsandGuts; CyberCowboy777; Salo; Bobsat; JosephW; ...

2 posted on 07/09/2009 10:55:09 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

I can see making sure a patch is well tested, but waiting a year to push something out?


3 posted on 07/09/2009 11:06:35 AM PDT by DonaldC
[ Post Reply | Private Reply | To 2 | View Replies]

To: ShadowAce

It was probably revealed to the hackers by some disgruntled employee who knew about it before he was layed off.


4 posted on 07/09/2009 11:06:38 AM PDT by Texas Fossil (The last time I looked, this is still Texas where I live.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: ShadowAce
.....legitimate organizations based in China

There is no such thing as a "legitimate organization based in China". I maintain a few web sites and at least 20% of the traffic comes from Commie China. Most the hits are queries trying to exploit well known vulnerabilities. Thank goodness for .htaccess, my Apache logs are now filled with 403 "Forbidden" errors. Take that, Commie Scum.
5 posted on 07/09/2009 11:31:28 AM PDT by 109ACS (Humpty Dumpty Was Pushed!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Anyone who thinks this is much ado about nothing is fooling themselves. Imagine a hacker gaining control of your computer and logging every password you use. He could enter your banking site and without much difficulty get your checking and savings account numbers as well as your routing code, phone number and address and social security number.


6 posted on 07/09/2009 11:38:56 AM PDT by Larry381 ("in the final instance civilization is always saved by a platoon of soldiers" Oswald Spengler)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Larry381

The key is to stop using MS products


7 posted on 07/09/2009 11:40:52 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 6 | View Replies]

To: ShadowAce

My Vista auto update bot is nagging me to update to IE 8. Should I?


8 posted on 07/09/2009 11:53:42 AM PDT by sportutegrl (If liberals could do math, they would be conservatives.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: sportutegrl
I don't know is this vulnerability exists in IE8. Also, the patch is probably also available.

I imagine that it should be safe to upgrade, and install the new security patch as well.

DISCLAIMER: I don't use IE at all, and use Windows as little as I'm allowed to (work). I am not an expert in this particular situation.

9 posted on 07/09/2009 12:01:46 PM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 8 | View Replies]

To: ShadowAce; sportutegrl

If memory serves, IE 7 + on Vista is not vulnerable to this particular issue. Unless I am confusing it with another IE issue. :-)

BTW, IE 8 is uninstallable, so if it breaks important web apps, you can revert to 7.


10 posted on 07/09/2009 12:08:50 PM PDT by Salo
[ Post Reply | Private Reply | To 9 | View Replies]

To: sportutegrl

Yes, because even if you tell it “no, and don’t bother me again,” it will come back and pester you again.

After you do that, then install and use Firefox. A better course of action would be to switch to Linux or buy a Mac.


11 posted on 07/09/2009 1:04:17 PM PDT by Spktyr (Overwhelmingly superior firepower and the willingness to use it is the only proven peace solution.)
[ Post Reply | Private Reply | To 8 | View Replies]

To: sportutegrl

“My Vista auto update bot is nagging me to update to IE 8. Should I?”

A resounding NO. I just took it off and went back to IE7.

Font and text sizing drove me crazy among other things.


12 posted on 07/11/2009 5:36:22 PM PDT by headstamp 2
[ Post Reply | Private Reply | To 8 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson