Welcome to HBH! If you have tried to register and didn't get a verification email, please using the following link to resend the verification email.

Microsoft Flaw Attracts Only Minor Malicious Acts


Microsoft Flaw Attracts Only Minor Malicious Acts

A major flaw in Microsoft's Windows operating system remained, for the most part, unexploited over the weekend, according to the software giant and security firms.

While some researchers have created proof-of-concept attacks for the bug in the Windows Server service, Microsoft has not seen "evidence of public, reliable exploit code showing code execution," Christopher Budd, a security program manager for Microsoft, said in a blog post on Sunday.

Want a chance to make a mark? Fire up those virtuals and get to work! Click below to read more.


A major flaw in Microsoft's Windows operating system remained, for the most part, unexploited over the weekend, according to the software giant and security firms.

While some researchers have created proof-of-concept attacks for <a href='http://www.securityfocus.com/brief/844' target='_blank'>the bug in the Windows Server service, Microsoft has not seen "evidence of public, reliable exploit code showing code execution," Christopher Budd, a security program manager for Microsoft, <a href='http://blogs.technet.com/msrc/archive/2008/10/26/update-on-ms08-067.aspx' target='_blank'>said in a blog post on Sunday. The only malicious code circulating on the Internet so far is a Trojan horse, dubbed by some security firms as "W32/Gimmiv," that predates the release of the patch for the flaw.

"We’re not aware of any broad attacks or new malware seeking to exploit this vulnerability since we’ve released the security update on Thursday," Budd stated in the blog post. "While there have been a couple of reports of a 'new worm,' these reports are actually inaccurate: they’re talking about malware we found in our investigation of the original targeted and limited attacks that we talked about in our posting on Thursday."

Several security professionals have claimed that they have created proof-of-concept attacks using the vulnerability. A researcher at security firm Immunity created an exploit for the flaw in about two hours, David Aitel, principal researcher for the firm, said <a href='http://lists.immunitysec.com/pipermail/dailydave/2008-October/005392.html' target='_blank'>on the company's mailing list.

A proof-of-concept exploit for the issue on Chinese Windows systems appeared on the Internet, according to a post by security firm F-Secure. Aside from that, little malicious activity has been seen, the company stated.

"The weekend was really quiet," F-Secure stated on the blog. "We received about a handful of Gimmiv variants and no other malware that uses the same vulnerability. … We are keeping a really close eye on the situation since all it takes is a single working 'universal' public exploit for things to go downhill pretty fast."

Source: <a href='http://www.securityfocus.com/brief/845' target='_blank'>http://www.securityfocus.com/brief/845

Comments
ghost's avatar
ghost 16 years ago

For those of you that aren't even reading this at all, you probably wouldn't be interested in a direct focus of the vulnerability. Here's a link; do with it what you will:

http://secunia.com/advisories/32326/

ghost's avatar
ghost 16 years ago

More information on the Gimmiv network-capable Trojan (or worm): http://blog.threatexpert.com/2008/10/gimmiva-exploits-zero-day-vulnerability.html