Samker's Computer Forum - SCforum.info

World TOP Headlines: => Latest Security News & Alerts => Topic started by: Samker on 24. February 2011., 07:30:27

Title: Microsoft patch bug in Malware Protection Engine
Post by: Samker on 24. February 2011., 07:30:27
(http://billmullins.files.wordpress.com/2010/04/image1.png)

Microsoft has patched a bug in its malware scanning engine that could be used as a stepping stone for an attacker looking to seize control of a Windows box.

The bug is fixed in an update to the Microsoft Malware Protection Engine that was pushed out to users of Microsoft's security products on Wednesday. It's what's known as an elevation of privilege vulnerability -- something that could be used by an attacker who already has access to the Windows system to gain complete administrative control.

Microsoft hasn't seen anyone take advantage of the bug yet -- the flaw was reported to the company by security researcher Cesar Cerrudo -- but Microsoft thinks that hackers could develop code that reliably exploits the issue.

In an instant message interview, Cerrudo, the CEO of security research firm Argeniss, said he disclosed the bug publicly at the Black Hat security conference in July 2010: http://www.argeniss.com/research/TokenKidnappingRevengePaper.pdf (http://www.argeniss.com/research/TokenKidnappingRevengePaper.pdf)
But because the hacker would already need have access to the machine to pull off this attack, he doesn't believe that it presents a major security risk to most users.

"This vulnerability could be exploited remotely, for instance on Internet Information Server, but the attacker will need to be able to upload an execute code on IIS," he said. "Sites that allow users to upload Web pages, they are more at risk."

Microsoft rates the issue as "important."

An attacker could take advantage of the flaw by changing a Windows registry key to a special value, which would then be processed by the malware engine at its next scan.

This would be useful if the criminal was already on a machine that had locked-down user privileges. "An attacker who successfully exploited this vulnerability could execute arbitrary code... and take complete control of the system," Microsoft said in a security advisory, released Wednesday. "An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights": http://www.microsoft.com/technet/security/advisory/2491888.mspx (http://www.microsoft.com/technet/security/advisory/2491888.mspx)

The issue is fixed in Version 1.1.6603.0 of the Malware Protection Engine, which is used in Windows Live OneCare, Microsoft Security Essentials, Windows Defender, Forefront Client Security, Forefront Endpoint Protection 2010, and the Microsoft Malicious Software Removal Tool.

Consumers should get the fix automatically as part of Microsoft's monthly update to its malware scanner.

This isn't the first time that Microsoft has found bugs in its security software. It reported bugs in the Malware Protection Engine back in 2007: http://www.microsoft.com/technet/security/bulletin/ms07-010.mspx (http://www.microsoft.com/technet/security/bulletin/ms07-010.mspx) and 2008: http://www.microsoft.com/technet/security/bulletin/ms08-029.mspx (http://www.microsoft.com/technet/security/bulletin/ms08-029.mspx)

(CW)