Personal Tech Pipeline | Researchers Stymied By Microsoft Vulnerability

White Papers

Sponsor Resources

WebCasts
Free Newsletter GlossaryContact UsAbout Us
Players & CamsPhones & PDAsHome & AutoOnline

June 15, 2005

Researchers Stymied By Microsoft Vulnerability



Courtesy of TechWeb News

Researchers on Wednesday were still dissecting one of the vulnerabilities patched by Microsoft Tuesday, and hadn't yet been able to "find the trick," said the head of one security firm's lab.

Mike Murray, the director of research at vulnerability management vendor nCircle, has had his entire team picking through the patch provided by Microsoft to fix a flaw in Windows' SMB (Server Message Block) protocol, and hasn't yet been able to find a way to exploit the vulnerability without going through authentication.

"It's incredible," said Murray. "We've found all the functions and the overflow, but we haven't been able to find the unauthenticated [attack] vector. We've found the authenticated vector, but as for the other, nope."

nCircle pulls apart disclosed vulnerabilities to create new methods of vulnerability detection, and in the short term, to provide guidance to its customers on the relative danger of flaws in applications and operating systems, including Windows.

According to Microsoft, the SMB vulnerability, which was laid out in one of the ten security bulletins released Tuesday, could be exploited remotely by an attacker without requiring authentication, in other words, without a legitimate Windows log-in username and password.

Such an unauthenticated attack avenue, experts warned Tuesday, made the bug much more dangerous, and could lead to a worm-style assault that attacked any computer with the SMB service exposed to the Internet.

"There's a trick to this one," said Murray. When asked if it was good news that his team couldn't find the exploit -- that if they couldn't perhaps attackers might not either -- he said "It only takes one person to figure out that trick, and then it'll break wide open."

Even though the nCircle research team has so far failed to puzzle out the SMB vulnerability, Murray still thinks that it's the most dangerous of the 12 announced yesterday.

"It's still the most threatening, by far," said Murray. "In fact, there are two vulnerabilities, not just one," he said. "[The second] is strictly a denial-of-service vulnerability, a way to crash the SMB service through an uninitialized variable. Maybe Microsoft missed it, or didn't think of it as a true vulnerability, since it was the [buffer] overflow they concentrated on."

Murray said his bunch would continue examining the vulnerability until they found a way to hack SMB sans authentication. "This is a tough nut to crack," he admitted. "Or maybe Microsoft was just throwing us a red herring telling us that it could be exploited unauthenticated."

E-mail This Story
Print This Story
Reprint This Story




Get the latest Personal Tech news, product info, and trends every week.


Related Content

  Right-click and choose Copy to extract RSS Feed URL  Personal Tech Pipeline's Main RSS Feed
  Right-click and choose Copy to extract RSS Feed URL  Personal Tech Pipeline's Blog RSS Feed



Keeping Up To Date On Enterprise Server Tech?
Review our compilation of columns on server security, database software, and Linux issues.
Unleash the Power & Opportunity of Grid Computing
Experts will identify trends in grid computing, provide
examples and examine solution options.
Using Current Performance to Shape
Future Results

Hear new strategies for improving business
performance and results.

Editor's Picks

Well, Microsoft has "unfolded" its "Origami" ultra-mobile PC platform Thursday. It turned out to be a full-featured PC smaller than a tablet but bigger than a PDA. Are you impressed?
Yes! I want one!
Sort of. We'll see.
No! It's too big for a pocket and too small for real computing. What's the point?


In search of personal tech products? See our new Product Finder, where you'll find personal computing devices, communications solutions, security products, and more.



PERSONAL TECH PIPELINE MARKETPLACE (sponsored links)
Trend Micro Enterprise Anti-Spyware Solutions
"Trend Micro is delivering what enterprise customers want." -The Forrester WAVE/Enterprise Anti-Spyware, Q1 2006/Forrester 2006. Download a FREE 30-day trial of Trend Micro Anti-Spyware Solutions for Enterprise Today.

Prevent Information Leaks from your Network
With GTB Inspector Appliance. Free Trial (March 2006 only). GTB Inspector is a hardware appliance. It is installed easily and transparently on the network edge and prevents leaks of confidential information to the Internet.

Cost-Effectively Secure Sensitive Data
Encrypting data in servers and databases can address security gaps and privacy legislation. Ingrian DataSecure Platforms offer granular encryption, seamless integration, and centralized security management. Combat data theft--with unprecedented ease and cost effectiveness. Download a white paper that outlines best practices for securing data.

Symantec Backup Solutions
Desktop to Data Center Protection. Explore the Official Symantec Site.

AntiSpy Enterprise Eliminate And Block Spyware
AntiSpy Enterprise Edition - is a security software system designed to locate, filter, and/or destroy vulnerabilities on any Windows´┐Ż-based network. End Spyware, Pop-ups, Home page Hijack and Active X threats across your network. Free trial.


Buy a Link Now


Top ten search terms from the TechWeb TechEncyclopedia
How does your pay rate? Check the InformationWeek Salary Survey
Mobilized Solutions Guide: Find and compare solutions for your business
Top Requested White Paper Categories from TechWeb White paper Library
Top ten search terms from the TechWeb TechEncyclopedia