Feeds

MS insists bodged fix didn't spawn Windows crash risk

Teardrop Explodes

Remote control for virtualized desktops

Microsoft has denied claims that an unpatched flaw in a file and printer sharing feature was inadvertently introduced when it fixed an earlier, less severe problem in the software back in December 2007.

Redmond patched a medium severity flaw in the same Server Message Block (SMB) version 2 functionality within Vista nearly two years ago. Unfortunately, in the process, it allegedly created a much more serious flaw that meant systems running Vista, pre-R2 versions of Windows Server 2008, and earlier versions of Windows 7.

Vulnerable systems can be crashed with only a single malformed packet, according to Laurent Gaffié, the security researcher who discovered the so-called Teardrop attack.

Gaffié claims to have tracked back the latter problem to changes Microsoft made in resolving a flaw in SMBv2 signing nearly two years ago (via MS07-063.mspx).

"The only thing I know regarding this 'patching' process is, when they fixed this code, they opened another bigger, worse security issue," Gaffié told Security Focus.

Microsoft denied suggestions that the earlier patch might be responsible for its latest security pickle. "We researched this claim by the researcher and confirmed this vulnerability was not introduced by MS07-063," said Christopher Budd, security response communications lead for Microsoft.

Redmond earlier acknowledged that, whatever its origins, the SMB flaw is real. As well as posing a system crashing risk, the flaw also poses a code injection danger. Security researchers separately warn that the flaw could lend itself to the creation of network worms.

Pending the availability of a fix from Microsoft, users are advised to apply either apply firewall defences (Block TCP ports 139 and 445) or disable SMBv2 as possible workarounds, as explained in an advisory by the software giant here. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?