Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Windows Operating Systems Software Microsoft Security

Attack Code Found For Recent Windows Bug 184

CWmike writes "Just a day after downplaying the vulnerability that caused it to issue an out-of-cycle patch last week, Microsoft warned customers late yesterday that exploit code had gone public and was being used in additional attacks. 'We've identified the public availability of exploit code that now shows code execution for the vulnerability addressed by MS08-067,' said Mike Reavey, operations manager of Microsoft's Security Response Center, in a post to the MSRC blog. 'This exploit code has been shown to result in remote code execution on Windows Server 2003, Windows XP, and Windows 2000.'"
This discussion has been archived. No new comments can be posted.

Attack Code Found For Recent Windows Bug

Comments Filter:
  • Clarification (Score:5, Informative)

    by Raconteur ( 1132577 ) on Tuesday October 28, 2008 @06:48PM (#25548535)
    Just in case the /. entry seemed as ambiguous to you as it did to me, the linked article states "Our investigation has shown that it does not affect customers who have installed the update."
  • by TubeSteak ( 669689 ) on Tuesday October 28, 2008 @06:48PM (#25548543) Journal

    No, this is the same exploit we talked about before.
    If you patched on the 23rd, you should be fine.

  • Re:Hotpatching (Score:3, Informative)

    by cheater512 ( 783349 ) <nick@nickstallman.net> on Tuesday October 28, 2008 @06:57PM (#25548629) Homepage

    Just switch to Linux servers instead.
    The ability to not require rebooting for years comes as standard. :)

    Downtime due to upgrades is limited to how fast you can restart the app.
    You can swap the files while its still running, then just restart it.

  • by Anonymous Coward on Tuesday October 28, 2008 @07:17PM (#25548789)

    Instead they issued an out-of-cycle patch and they gave it a very high severity rating in their bulletins. None of us are Microsoft lovers. But you don't have to lie to us just to be able to pat us on the back. It's disgusting, please stop it.

  • by Macthorpe ( 960048 ) on Tuesday October 28, 2008 @07:49PM (#25549121) Journal

    You've always been able to automatically update even cracked copies of Windows automatically, you just can't do it via update.microsoft.com.

    I'm not sure where you've got your information from.

  • by Anonymous Coward on Tuesday October 28, 2008 @08:11PM (#25549351)

    LOL! Yea... especially considering that doing some SIMPLE things like these:

    1.) Stopping "File & Print Sharing", via your local connection, removing it as a Client/Protocol there (if you're not on a Lan Manager based OR Active Directory IP based LAN/WAN, or home network? Who cares! It's slowing you down just broadcasting extra packets anyhow OR listening for them too, wasting IO + resources) & the SYSTEM ICON in Control Panel (as to options &/or quick tasks to perform for that) make it a snap to stop it from being effective

    ----

    2.) Removing ALL shares, hidden or otherwise via say, a batchfile (or even DOS command prompt) like:

    C:
    NET SHARE C$ /DELETE
    NET SHARE ADMIN$ /DELETE
    NET SHARE IPC$ /DELETE
    NET SHARE DFS$ /DELETE
    NET SHARE COMCFG$ /DELETE
    NET SHARE FAX$ /DELETE
    NET SHARE NETLOGON /DELETE
    NET SHARE PRINT$ /DELETE
    NET USE * /DELETE

    ----

    3.) Stopping the SERVER SERVICE (which allows sharing, & if you're not part of a LAN/WAN (like a single user system online on the internet only), you also save Memory, CPU Cycles, & Other I/O by cutting said service (via service.msc & setting its default startup type to DISABLED, & stopping it there also, once you doubleclick on it in the list)

    That also, can stop this exploit from being effective - as IT is what permits shares & file + print sharing...

    ----

    See - Technically, afaik, @ this point (haven't read the EXACT details of this thing's coding & methods though, via this RECENT CURRENT news on it)?

    Each/ALL/ANY of those measures SHOULD work, just fine, in mitigating this prior to applying this patch (especially if you're a standalone machine on the internet @ home, with no home LAN present)...

    (AND PLEASE - Feel free to correct me if I am off/wrong here fellas... thanks, as again, I have not "RTFA" (/. badge of honor, lol), yet as I noted above...)

    APK

    P.S.=> Afaik? That's more than adequate to stop this being exploitable, because if there are no SHARED DISKS present? How can you get to anything to execute anything?? File ACL's also being set (to stop remote NETWORK SERVICE, or other remote capable services &/or user-entities, except that which YOU use) helps moreso than the above, maybe overkill, but worth doing & should be by everyone anyhow, imo @ least... apk

  • Metasploit (Score:5, Informative)

    by slimjim8094 ( 941042 ) on Tuesday October 28, 2008 @08:14PM (#25549373)

    Be warned; this is already on metasploit. The intrepid can find this for themselves...

    Testing it to see if it actually works though.

  • by gparent ( 1242548 ) on Tuesday October 28, 2008 @08:19PM (#25549417)
    So you mean giving it permission, right? Thought so.
  • by felipekk ( 1007591 ) on Tuesday October 28, 2008 @08:36PM (#25549549) Journal

    Please mod parent up.

    Microsoft even contacted partners to make sure they were applying the patch as soon as possible.

    I don't know where the author got the downplaying from...

  • Re:Hotpatching (Score:4, Informative)

    by DamnStupidElf ( 649844 ) <Fingolfin@linuxmail.org> on Tuesday October 28, 2008 @09:05PM (#25549797)

    Come on, it's dead simple and it's safe. Just install a page fault handler and mark all the pages of the DLL as being unavailable, examine the current thread state of all processes and mark them if they are currently executing in the unavaiable pages, and if so simply return success from the page fault handler until the thread leaves the locked region (essentially single step through the DLL until it finally returns to the caller). If a thread was not originally executing in the protected pages and enters it, just stall it. Once all threads are stalled or not accessing the locked pages, patch the DLL and mark the pages available and uninstall the page fault handler.

    What could possibly go wrong? Only if the data structures that the DLL uses internally are modified will this be difficult, in which case the patched DLL will just have to convert its own data during the patch time. If changes to user data structures are required, then the patched DLL would have to burn some space in each new data structure to identify it as a patched version and treat it appropriately, while detecting the old data structures reliably. That might be a little harder than the general case, but not impossible.

    Is getting 0wned something you would want to happen on a production server that can't have downtime?

  • Re:Hmmm... (Score:3, Informative)

    by rikkards ( 98006 ) on Tuesday October 28, 2008 @09:12PM (#25549843) Journal

    That plus the wireless network card drops randomly. The message in dmesg is that it can't find the AP so it assumes it is gone. Restarting the networking fixes it.

  • Comment removed (Score:5, Informative)

    by account_deleted ( 4530225 ) on Tuesday October 28, 2008 @10:25PM (#25550341)
    Comment removed based on user account deletion
  • Re:Hmmm... (Score:3, Informative)

    by Venik ( 915777 ) on Wednesday October 29, 2008 @03:06AM (#25551747)
    I don't know where you work, but unstable servers are usually a result of poor planning by system architects, insufficient funding, or inexperienced sysadmins. If I had any servers that were continuously unstable for the reasons you listed, I would lose my job. Sometimes you do have to support a system that has been outgrown by its users and applications, but there is no funding to get an upgrade and so you have to make do. This would be a valid reason for system instability. But to say that the server is crashing all the time because you installed all kinds of garbage on it without first doing the necessary checking and testing - just because some software vendor released a patch - is simply an admission of incompetence or just plain laziness. Most servers I work with are high-performance computing boxes used for CFD, FEM and other HPC tasks. Believe me, these systems run at full capacity most of the time. This is why you need these operating systems and this is why these machines cost so much. And your point of view is a perfect illustration of what I wrote in the previous post.

This file will self-destruct in five minutes.

Working...