Critical Windows Flaws Discovered


Del.icio.us  Digg  Google  Spurl  Blink  Furl  Y! MyWeb  
Share:
Sponsors:

Vulnerabilities recently found in the Windows operating system could lead to the emergence of worms with the potential to inflict as much damage as the previous Zotob, Sasser, and Blaster viruses, security authorities warned.

The most serious of the flaws could allow remote access to the Microsoft (Nasdaq: MSFT - news) Distributed Transaction Coordinator (MSDTC), a component of the operating system used to coordinate transactions between databases, messaging systems, and file systems across networked machines.

When exploited, this flaw gives attackers the ability to run remote commands with full system privileges.

Exploit Coming SoonGiven that larger organizations often have the most difficulty quickly patching vulnerable systems, a worm based on this vulnerability could wreak havoc on large enterprises.

Exploit code for this vulnerability already has been written by a security firm, so it probably won't take long for worm to be created, said Alfred Huger, senior director of engineering at Symantec Security Response.

"This exploit matches well with a worm, and the impact will depend on the number of people who install the necessary patches," he said.

Other critical discoveries include remotely exploitable flaws in Windows Media Player, Windows ActiveX, and the Plug and Play service of the Windows operating system. These critical security flaws affect Windows NT, 2000, XP, and Windows Server 2003 machines.

If left unpatched, the vulnerabilities could enable an attacker to install programs, change or delete data, or create new accounts with full system privileges.

Customer Responsibility

With millions of installations around the world,
Windows 2000 represents a significant percentage of all Windows servers running today.

"Microsoft has patches available for businesses and consumers, but the problem for enterprises is that they have to be careful in applying the patches, which can damage complex computer systems," Huger said.

Yankee Group senior analyst Andrew Jaquith noted that hackers now can launch scripted attacks that exploit software vulnerabilities in a matter of hours.

"Microsoft is doing the best that it can to address the problems, but they are on a running on a treadmill," he said. "They can issue the patches, but it's up to their customers to remain vigilant and to upgrade their operating systems to more secure products as soon as they able to do so."

Article submitted by: Some1
Last Update: 10-15-2005
Category: Security

Print | E-mail


Current rating: 5.4 by 45 users
Would you recommend this article to a friend?

Not a Chance 12345678910 Absolutely

Please register or sign-in to post comments.


Related News Stories

(9,185 reads) 07-05-2008
 · Fusion Security
(14,876 reads) 06-02-2007
 · NukeSentinel(tm)2.5.10 Critical Update
(13,648 reads) 05-07-2007
 · NukeSentinel(tm) 2.5.08 Maintainance Release
(15,090 reads) 03-15-2007
 · NukeSentinel(tm) 2.5.07 Reissued: Critical Update
(13,586 reads) 03-02-2007
 · NukeSentinel(tm) 2.5.06: Critical Update
(14,374 reads) 01-23-2007
 · NukeSentinel(tm) 2.5.05 released
(14,408 reads) 12-24-2006
 · NukeSentinel 2.5.04 released
(14,128 reads) 11-03-2006
 · NukeSentinel(tm) 2.5.03 Released
(17,981 reads) 10-19-2006
 · Php Nuke 8.0 Patched
(14,362 reads) 10-01-2006
 · ipBan Modification