Security Watch

'Advisories' Are Not Enough

Microsoft's security alerts will be lost on most ordinary users.

Hacking/Denial of Service
Microsoft has begun a new security service called "Microsoft Security Advisories." The advisories are meant to provide information on security-related enhancements to products and address security concerns "that may not require a security bulletin but that may still affect customers' overall security," according to Microsoft's Web site.

Microsoft Security Advisory 892313 warns about a Windows Media Player vulnerability. It has to do with the automatic acquisition of media licenses in Media Player 9 and 10, which can be abused to cause unsuspecting users to visit sites other than those they thought they were visiting. The automatic acquisition feature allows media authors (attackers, in this case) to specify malicious sites as the location to receive a license; when the browser visits the alleged license site, malicious software is downloaded instead.

Expect to see more of these advisories. Unfortunately, Microsoft has decided that such updates don't warrant the same treatment as vulnerabilities. It has a point—the Media Player situation, for example, is not a vulnerability per se, since the attacker must be able to specify the location of his license repository. In practice, however, the question is whether or not this feature should ever be completely silent—triggered without some type of warning for the user. Given the number of existing browser vulnerabilities, and the fact that license retrieval is done via browser, you have to ask whether it's prudent to allow browsers to be sent to any site silently. Also, since this won't appear in Windows Update, the vast majority of consumers—those most likely to be attacked—will remain unaware of the potential for problems.

Corporations obviously don't want to receive updates too frequently; and for those using appropriate content filtering (for example, by prohibiting media file downloads from the Internet, preventing attempts at license acquisition), there shouldn't be a problem. However, given the current state of affairs, Microsoft should be erring on the side of caution and pushing such updates like this to all consumers via Automatic Updates. The update's new feature (the ability to decide whether you will or won't be prompted when retrieving licenses) should be turned on by default.

The UK National Infrastructure Security Co-ordination Center (NISCC) has announced a flaw in IPsec, a widely-used VPN protocol suite, that could allow attackers to intercept secure network communications. The vulnerability affects certain configurations of IPsec that use Encapsulating Security Payload (ESP) in tunnel mode with confidentiality; configurations with integrity protection being provided by a higher layer protocol; and some IPSec configurations using the key Authentication Header (AH) protocol. If exploited, it's possible that some plain text portions of the secure communication may be sent back to the attacker, thus allowing the attacker to view the confidential communication. If ICMP (Internet Control Message Protocol) error messages are prevented from being sent back to tunnel participants, the leakage can be prevented.

RSA Authentication Agent for Web 5.3 and earlier versions contain a buffer overflow vulnerability which could be exploited by a remote attacker. The hole is yet another example of a chunked encoding vulnerability. Chunked encoding has been heavily scrutinized of late, resulting in numerous vulnerabilities in various products. This vulnerability could result in a remote attacker obtaining "System" privileges on the server hosting the RSA Web Agent. Such a server typically would be a critical system in your security infrastructure. RSA has released a patch for the vulnerability.

About the Author

Russ Cooper is a senior information security analyst with Verizon Business, Inc. He's also founder and editor of NTBugtraq, www.ntbugtraq.com, one of the industry's most influential mailing lists dedicated to Microsoft security. One of the world's most-recognized security experts, he's often quoted by major media outlets on security issues.

comments powered by Disqus
Most   Popular