Feeds

Four new ways to stuff someone's Win machine

Media Player threats, memory leaks, social engineering and more

  • alert
  • submit to reddit

3 Big data security analytics techniques

MS Bug Roundup: We've seen another spike in Microsoft security bulletins during the past few days. Funny how these things seem to run in cycles....



First up, a nifty hole which affects RPC (Remote Procedure Calling), which is used chiefly to support distributed applications.

In this instance, a malicious RPC request can cause a denial of service on MS Exchange Server 5.5, Exchange Server 2000, SQL Server 7.0, SQL Server 2000, Win-NT 4.0 and Win-2K, according to an MS security bulletin.

"The precise type of disruption would depend on the specific service, but could range in effect from minor (e.g., the service temporarily hanging) to major (e.g., the service failing in a way that would require the entire system to be restarted)," MS says.

Get your patches by following the security bulletin link above.



Next up, an unchecked buffer in MS Media Player affecting all users of MP 6.4, 7, and 7.1., which can allow an attacker to run arbitrary code on the victim's machine with the user's level of permission.

The glitch exists in the streaming media support supplied by Media Station (NSC) files. Improper input validation in the NSC handler makes the overrun available for exploitation.

To accomplish that, an attacker might post a malicious media file on a Web site and either entice visitors to access it or set it up to launch automatically.

Patches and further details are available from this MS security bulletin.



Next we have a memory leak in Win-2K Terminal Server involving the processing of incoming RDP (Remote Data Protocol) data via port 3389. Each time a maliciously-crafted RDP packet is processed, the memory leak depletes overall server memory by a small amount.

Since the memory won't be re-allocated to the processor, the cumulative effect of repeated attacks will eventually deplete system memory and result in a denial of service.

Systems affected include Win-NT 4.0, Terminal Server Edition; Win-2K Server; 2K Advanced Server; and 2K Datacenter Server.

This one is not difficult to stop: any firewall can block it, and bunging port 3389 will of course do the same.

Nevertheless, there are patches available here.



Finally, a recent social-engineering hack involves an e-mail memo which contains

a bogus MS security bulletin

, and which urges the recipient to follow a supplied URL to download a patch. The so-called patch is, of course, a malicious executable. Big laffs. ®

SANS - Survey on application security programs

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
Ditch the sync, paddle in the Streem: Upstart offers syncless sharing
Upload, delete and carry on sharing afterwards?
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.