Feeds

'Bluetooth sniper' Windows vuln fix in light Patch Tuesday

Unpatched machines can be crashed wirelessly

Security for virtualized datacentres

Microsoft's latest patch Tuesday landed last night with four bulletins, the most significant of which fixes a Bluetooth-related vulnerability in Windows 7 and Windows Vista.

The patch (MS11-053) fixes a vulnerability in the Bluetooth stack within Windows that creates a possible, albeit difficult to exploit, code injection risk. An attacker would normally need to be both near and in possession of a Bluetooth address - not revealed via the vulnerability itself - to cause any mischief. It's more likely that the bug might be abused to crash Windows boxes that have Bluetooth enabled, a far easier trick to pull off.

Marcus J Carey, security researcher and community manager at vulnerability management outfit Rapid7, said this type of wireless vulnerability could become more common in future.

"We can expect more Bluetooth related bugs popping up due to projects like Project Ubertooth, which is enabling security researchers to experiment with Bluetooth hardware and communication," Carey explained. "While critical, this vulnerability could be difficult to exploit as generally speaking attackers would need to be in the immediate vicinity of the Bluetooth device to compromise it; however, there are devices known as 'Bluetooth Sniper Rifles' that enable attacks from greater distances."

Two of the other three bulletins in July's patch batch also cover flaws in Windows. The bugs in Windows Kernel-Mode Drivers (win32k.sys) and Windows Client/Server Runtime Subsystem (CSRSS) addressed by the two updates are both rated at "important". The final notice covers a security bug in Visio 2003 SP3, also classified as "important".

An overview of the updates can be found in a blog post by the Internet Storm Centre here. Microsoft's advisory is here.

July's Patch Tuesday of four bulletins is a just a quarter the size of the massive batch Redmond's security gnomes hatched in June, continuing an alternating pattern of light and heavy update loads that been a feature of Patch Tuesday over recent months. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
NASTY SSL 3.0 vuln to be revealed soon – sources (Update: It's POODLE)
So nasty no one's even whispering until patch is out
Russian hackers exploit 'Sandworm' bug 'to spy on NATO, EU PCs'
Fix imminent from Microsoft for Vista, Server 2008, other stuff
Microsoft pulls another dodgy patch
Redmond makes a hash of hashing add-on
'LulzSec leader Aush0k' found to be naughty boy not worthy of jail
15 months home detention leaves egg on feds' faces as they grab for more power
Forget passwords, let's use SELFIES, says Obama's cyber tsar
Michael Daniel wants to kill passwords dead
FBI boss: We don't want a backdoor, we want the front door to phones
Claims it's what the Founding Fathers would have wanted – catching killers and pedos
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Win a year’s supply of chocolate
There is no techie angle to this competition so we're not going to pretend there is, but everyone loves chocolate so who cares.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.