Feeds

MS probes bug that turns PCs into 'public file servers'

Unwanted promotion for older Windows boxes

Providing a secure and efficient Helpdesk

Microsoft has begun investigating a flaw in IE that most affects older versions of Windows, and turns vulnerable systems into a "public file server".

The vulnerability means that hackers might be able to access files with an already known filename and location, providing they can trick users into visiting a maliciously constructed website. For this approach to work, the Protected Mode feature - which runs by default in Vista, Windows 7, and Windows Server 2008 - needs to be absent or disabled.

The bug is therefore much more of a potential concern for XP and Windows 2000 shops, whose users are potentially in the firing line even if they are running IE 8. The vulnerability has not become the target for active hacker exploitation and is unrelated to the IE flaw linked to attacks on Google and other hi-tech firms back in December.

Given the lack of active attacks, an out of sequence patch is highly unlikely. It's far more probable that Redmond will publish an update in March rather than in next Tuesday's Patch Tuesday, which doesn't allow anything like enough time to develop a patch, much less test it.

Microsoft's advisory, published on Wednesday, explains the issue in greater depth. Redmond's investigation of the bug follows a presentation of the flaw by Jorge Luis Alvarez Medina of Core Security Technologies, at the Black Hat security conference in Washington this week.

His description of the flaw, as something that "turns your personal computer into a public file server", is far more eye-catching than Redmond's description of the risk as an "information disclosure" bug.

Our earlier interview with Medina where he explains the latest IE years, the latest of several Core has reported to Microsoft over the years, can be found here. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Hackers thrash Bash Shellshock bug: World races to cover hole
Update your gear now to avoid early attacks hitting the web
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.