Researchers Stymied By Microsoft Vulnerability - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
News
News
6/15/2005
02:11 PM
50%
50%

Researchers Stymied By Microsoft Vulnerability

Computer security researchers are still perplexed by one of the vulnerabilities patched this week by Microsoft.

Researchers on Wednesday were still dissecting one of the vulnerabilities patched by Microsoft Tuesday, and hadn't yet been able to "find the trick," said the head of one security firm's lab.

Mike Murray, the director of research at vulnerability management vendor nCircle, has had his entire team picking through the patch provided by Microsoft to fix a flaw in Windows' SMB (Server Message Block) protocol, and hasn't yet been able to find a way to exploit the vulnerability without going through authentication.

"It's incredible," said Murray. "We've found all the functions and the overflow, but we haven't been able to find the unauthenticated [attack] vector. We've found the authenticated vector, but as for the other, nope."

nCircle pulls apart disclosed vulnerabilities to create new methods of vulnerability detection, and in the short term, to provide guidance to its customers on the relative danger of flaws in applications and operating systems, including Windows.

According to Microsoft, the SMB vulnerability, which was laid out in one of the ten security bulletins released Tuesday, could be exploited remotely by an attacker without requiring authentication, in other words, without a legitimate Windows log-in username and password.

Such an unauthenticated attack avenue, experts warned Tuesday, made the bug much more dangerous, and could lead to a worm-style assault that attacked any computer with the SMB service exposed to the Internet.

"There's a trick to this one," said Murray. When asked if it was good news that his team couldn't find the exploit -- that if they couldn't perhaps attackers might not either -- he said "It only takes one person to figure out that trick, and then it'll break wide open."

Even though the nCircle research team has so far failed to puzzle out the SMB vulnerability, Murray still thinks that it's the most dangerous of the 12 announced yesterday.

"It's still the most threatening, by far," said Murray. "In fact, there are two vulnerabilities, not just one," he said. "[The second] is strictly a denial-of-service vulnerability, a way to crash the SMB service through an uninitialized variable. Maybe Microsoft missed it, or didn't think of it as a true vulnerability, since it was the [buffer] overflow they concentrated on."

Murray said his bunch would continue examining the vulnerability until they found a way to hack SMB sans authentication. "This is a tough nut to crack," he admitted. "Or maybe Microsoft was just throwing us a red herring telling us that it could be exploited unauthenticated."

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
State of the Cloud
State of the Cloud
Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges today.
Slideshows
What Digital Transformation Is (And Isn't)
Cynthia Harvey, Freelance Journalist, InformationWeek,  12/4/2019
Commentary
Watch Out for New Barriers to Faster Software Development
Lisa Morgan, Freelance Writer,  12/3/2019
Commentary
If DevOps Is So Awesome, Why Is Your Initiative Failing?
Guest Commentary, Guest Commentary,  12/2/2019
Register for InformationWeek Newsletters
Video
Current Issue
The Cloud Gets Ready for the 20's
This IT Trend Report explores how cloud computing is being shaped for the next phase in its maturation. It will help enterprise IT decision makers and business leaders understand some of the key trends reflected emerging cloud concepts and technologies, and in enterprise cloud usage patterns. Get it today!
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll