Welcome, Guest. Please login or register.
April 23, 2024, 07:47:13 PM

Login with username, password and session length

Search:     Advanced search
we're back, baby
*
Home Help Search Login Register
f13.net  |  f13.net General Forums  |  General Discussion  |  Serious Business  |  Topic: Catastrophic Windows Bug for All Versions: Update Now 0 Members and 1 Guest are viewing this topic.
Pages: [1] Go Down Print
Author Topic: Catastrophic Windows Bug for All Versions: Update Now  (Read 5013 times)
Sir T
Terracotta Army
Posts: 14223


on: November 11, 2014, 10:04:34 PM

Didn;t find a mention of this. Update now peeps.

http://arstechnica.com/security/2014/11/potentially-catastrophic-bug-bites-all-versions-of-windows-patch-now/


Quote
Potentially catastrophic bug bites all versions of Windows. Patch now
Bug allowing execution of malicious code resides in TLS stack.

by Dan Goodin - Nov 12, 2014 12:45 am UTC


Microsoft has disclosed a potentially catastrophic vulnerability in virtually all versions of Windows. People operating Windows systems, particularly those who run websites, should immediately install a patch Microsoft released Tuesday morning.

The vulnerability resides in the Microsoft secure channel (schannel) security component that implements the secure sockets layer and transport layer security (TLS) protocols, according to a Microsoft advisory. A failure to properly filter specially formed packets makes it possible for attackers to execute attack code of their choosing by sending malicious traffic to a Windows-based server.

While the advisory makes reference to vulnerabilities targeting Windows servers, the vulnerability is rated critical for client and server versions of Windows alike, an indication the remote-code bug may also threaten Windows desktops and laptop users as well. Amol Sarwate, director of engineering at Qualys, told Ars the flaw leaves client machines open if users run software that monitors Internet ports and accepts encrypted connections.

"If they install software that listens on port, then that machine would be vulnerable," he said. An example would be "if they run Windows 7 but install an FTP server on it that accepts connections from outside, or a Web server on a client."

Tuesday's disclosure means that every major TLS stack—including Apple SecureTransport , GNUTLS, OpenSSL, NSS, and now Microsoft SChannel—has had a severe vulnerability this year. In some cases, the flaws merely allowed attackers to bypass encryption protections, while others—most notably the Heartbleed bug in OpenSSL and the one patched Tuesday in Windows, allowed adversaries to steal highly sensitive data and execute malicious code on vulnerable systems respectively.

Microsoft's advisory said there are no mitigating factors and no workarounds for the bug. A separate exploitation index assessed real-world attacks as "likely" for both newer and older Windows releases. The advisory said there is no evidence pointing to in-the-wild exploits against Windows users at the time it was drafted. MS14-066 was one of 16 updates Microsoft scheduled for this month's Patch Tuesday batch. They include a fix for a zero-day vulnerability already under attack in highly targeted espionage attacks.

It took less than 12 hours after the disclosure of the catastrophic Heartbleed bug for it to be turned against Yahoo and other sites. Anyone who uses a Windows computer—especially if it runs a Web or e-mail server—should ensure Tuesday's update is installed immediately.

Hic sunt dracones.
ajax34i
Terracotta Army
Posts: 2527


Reply #1 on: November 12, 2014, 07:21:47 PM

Similar to that Heartbleed virus/issue earlier this year?
Fordel
Terracotta Army
Posts: 8306


Reply #2 on: November 12, 2014, 07:33:33 PM

Oh is this why this update was like 20 items long?

and the gate is like I TOO AM CAPABLE OF SPEECH
Torinak
Terracotta Army
Posts: 847


Reply #3 on: November 12, 2014, 08:19:32 PM

Similar to that Heartbleed virus/issue earlier this year?

Based on the above, it's much much worse. Heartbleed allowed for stealing credentials. This bug allows for fully compromising the system, just by sending it network traffic. So, an attacker can scan the entire Internet and automatically compromise any vulnerable system.
calapine
Terracotta Army
Posts: 7352

Solely responsible for the thread on "The Condom Wall."


Reply #4 on: November 15, 2014, 11:00:56 AM

There also has been a fix for another, separate bug which apparently has been around for 18(!) years.

Quote from: www.us-cert.gov
A vulnerability in Microsoft Windows Object Linking and Embedding (OLE) could allow remote code execution if a user views a specially-crafted web page in Internet Explorer.[1]

Description
This vulnerability can be exploited using a specially-crafted web page utilizing VBscript in Internet Explorer. However, it may impact other software that makes use of OleAut32.dll and VBscript.

Exploit code is publicly available for this vulnerability. Additional details may be found in CERT/CC Vulnerability Note VU#158647.

Impact
Arbitrary code can be run on the computer with user privileges. If the user is an administrator, the attacker may run arbitrary code as an administrator, fully compromising the system.

More detailed:
http://securityintelligence.com/ibm-x-force-researcher-finds-significant-vulnerability-in-microsoft-windows/

Affects all Windows versions back Windows 95. IBM already alerted MS about this already in may, but it's patched only now.

[tinfoil] Convenient for MS that this exploit wasn't found earlier this year. Thus no patch for Windows XP. [/tinfoil]

For Windows XP users not browsing with Internet Explorer should be a first step, because the exploit relies on VBScript, which only IE still bothers to support.  no responsibility is taken for the correctness of this information

Edit: Oh, I found this tid-bit from the X-Force researcher interesting: "I have no doubt that it would have fetched six figures on the gray market. " What temptation that must be working at such place...  Grin
« Last Edit: November 15, 2014, 11:11:06 AM by calapine »

Restoration is a perfectly valid school of magic!
Yegolev
Moderator
Posts: 24440

2/10 WOULD NOT INGEST


WWW
Reply #5 on: November 17, 2014, 08:41:49 AM

I suppose this is of no concern to people that do not use IE.

Why am I homeless?  Why do all you motherfuckers need homes is the real question.
They called it The Prayer, its answer was law
Mommy come back 'cause the water's all gone
Chimpy
Terracotta Army
Posts: 10619


WWW
Reply #6 on: November 17, 2014, 08:46:20 AM

The security vulnerability is bigger than just a IE/VBS thing. The exploit they talk about of said vulnerability requires VBS.

'Reality' is the only word in the language that should always be used in quotes.
Yegolev
Moderator
Posts: 24440

2/10 WOULD NOT INGEST


WWW
Reply #7 on: November 17, 2014, 08:56:37 AM

I will then suppose it depends on what is meant by a specially-crafted web page.

Why am I homeless?  Why do all you motherfuckers need homes is the real question.
They called it The Prayer, its answer was law
Mommy come back 'cause the water's all gone
Torinak
Terracotta Army
Posts: 847


Reply #8 on: November 17, 2014, 03:41:53 PM

I suppose this is of no concern to people that do not use IE.

Watch out for other programs that may "helpfully" launch IE so you can view exciting news about the MMO you're trying to patch, read documentation, license agreements, program updates, etc.

Also, the requirement that a "user views a specially-crafted web page" usually translates into "user visits a not-bad site that happens to be using a dodgy ad provider that sends you to the specially-crafted web page".
Yegolev
Moderator
Posts: 24440

2/10 WOULD NOT INGEST


WWW
Reply #9 on: November 18, 2014, 06:39:20 AM

Yes, the applications that open IE instead of Default Browser are super annoying.  Especially since DB is Firefox+NoScript+ABE+Ghostery.

Why am I homeless?  Why do all you motherfuckers need homes is the real question.
They called it The Prayer, its answer was law
Mommy come back 'cause the water's all gone
Samwise
Moderator
Posts: 19220

sentient yeast infection


WWW
Reply #10 on: November 18, 2014, 08:41:58 AM

Isn't the Steam overlay browser on Windows IE-based?

"I have not actually recommended many games, and I'll go on the record here saying my track record is probably best in the industry." - schild
bhodi
Moderator
Posts: 6817

No lie.


Reply #11 on: November 18, 2014, 01:06:13 PM

Yes.
Yegolev
Moderator
Posts: 24440

2/10 WOULD NOT INGEST


WWW
Reply #12 on: November 18, 2014, 01:27:21 PM

awesome, for real

Why am I homeless?  Why do all you motherfuckers need homes is the real question.
They called it The Prayer, its answer was law
Mommy come back 'cause the water's all gone
KallDrexx
Terracotta Army
Posts: 3510


Reply #13 on: November 18, 2014, 09:23:49 PM

I thought they replaced it with a webkit based browser to make cross compatibility easier.
calapine
Terracotta Army
Posts: 7352

Solely responsible for the thread on "The Condom Wall."


Reply #14 on: November 19, 2014, 01:49:18 PM

I thought they replaced it with a webkit based browser to make cross compatibility easier.

I looked it up, and thank god you are right. WebKit since 2010.

Restoration is a perfectly valid school of magic!
Pages: [1] Go Up Print 
f13.net  |  f13.net General Forums  |  General Discussion  |  Serious Business  |  Topic: Catastrophic Windows Bug for All Versions: Update Now  
Jump to:  

Powered by SMF 1.1.10 | SMF © 2006-2009, Simple Machines LLC