Microsoft patches new Windows bug exploited by Stuxnet

Fixes 11 flaws, reveals that July worm used four zero-days to infect PCs

Microsoft today delivered nine security updates to patch 11 bugs in Office, the IIS Web server and Windows, including one that was overlooked but exploited by a July worm.

"Our old friend Stuxnet is back," said Jason Miller, data and security team manager for patch-management vendor Shavlik Technologies, referring to a worm that popped up two months as it attacked Windows computers used to manage industrial control systems in major manufacturing and utility companies.

"Vulnerability researchers decompiled the worm and found it was doing something else," Miller added.

That something else was exploiting a vulnerability in Windows' print spooler service, a fact that experts at U.S. antivirus vendor Symantec and the Russian security firm Kaspersky Lab reported to Microsoft.

Microsoft patched the print pooler software with MS10-061 today, but said two lesser zero-day vulnerabilities -- one rooted out by Kaspersky, the other by Microsoft's engineers -- will be addressed in a future update.

In early August, Microsoft shipped an emergency, or "out-of-band" update to plug a hole in Windows shortcuts, the small files displayed by icons on the desktop, on the toolbar and in the Start menu that launch applications and documents when clicked. Stuxnet had also used the shortcut bug to compromise computers.

"The fact that Stuxnet targets four previously unidentified vulnerabilities makes the worm a real standout among malware," said Alex Gostev, chief security expert with Kaspersky, in an e-mail today. "It's the first time we've come across a threat that contains so many 'surprises.'"

Other researchers echoed Gostev's new-found respect for Stuxnet's makers.

"That was a very liberal use of zero-days," noted Wolfgang Kandek, CTO at Qualys, talking about the four previously-unknown vulnerabilities the worm exploited. "I don't want to say they wasted them, but you have to wonder why someone would use four zero-days in one piece of malware. The targets must have been very important to them."

According to data compiled by Symantec in July, computers in Iran were hit hardest by Stuxnet. Siemens, whose control software was targeted by Stuxnet, today said that the worm had infected at least 14 plants .

Most researchers who Computerworld contacted today put the MS10-061 print spooler patch at the top of their to-do lists.

Andrew Storms, director of security operations at nCircle Security, was the exception.

"MS10-061 is a big deal because of its relationship to Stuxnet, but its command-and-control has been pretty much knocked out," Storms said. "It's an important item for Microsoft to fix because there exploitation is going on, but for the worm to [exploit the vulnerability] is rather mitigated."

Microsoft said that Windows XP machines sharing printers are the most vulnerable to attack.

But everyone agreed that a different update, MS10-062, should be patched immediately.

"We're back to media bugs," noted Miller of Shavlik. "Media and media players are very prevalent. Everyone watches video on the Web, and they may not know what they're getting themselves into."

MS10-062 patches a flaw in the MPEG-4 codec -- software that compresses and decompresses digital audio or video -- that could be used by hackers in drive-by attacks, where users' PCs are hijacked when they simply visit a malicious Web site that's serving up a malicious media file or rigged content that's streamed through a browser or other application.

Microsoft pegged MS10-061 and MS10-062 as the two updates to apply first.

Altogether, Microsoft released nine security bulletins today, four marked "critical," the most serious threat rating in its four-step scoring system. The other five were tagged "important," the second-highest ranking. The nine updates patched a total of 11 individual vulnerabilities, four of them judged critical.

Other updates called out by experts today included MS10-065 , a three-patch batch for Internet Information Services (IIS), Microsoft's Web server software; and MS10-063 , which patches a bug in how Windows parses OpenType fonts.

The latter is another drive-by opportunity for hackers, said Amol Sarwate, the manager of Qualys' vulnerabilities research lab.

MS10-065, on the other hand, will be of interest to hosting providers that run IIS and support PHP, said Storms. The PHP scripting language is often used to code online forums and bulletin boards, and requires the FastCGI protocol. Attackers able to locate IIS servers with FastCGI enabled could remotely hijack the machine.

"Hosting providers may not think this is critical," warned Storms, "but it is for them."

Microsoft, however, downplayed the real-world threat. "While a successful exploit leading to remote code execution is possible in theory, there are some technical factors that make it less likely," Mark Wodrich, an engineer with the Microsoft Security Response Center, said in an entry on a company blog today. "In practice, it is more likely that attacks will lead to a crash of the IIS worker process and a denial-of-service (DoS) condition when the service reaches its restart limit."

Microsoft also patched vulnerabilities in its Outlook e-mail client and the WordPad text converter for Word 97, as well as others in various protocols and subsystems within Windows.

This month's security update can be downloaded and installed via the Microsoft Update and Windows Update services, as well as through Windows Server Update Services.

Tags symantecsecurityMicrosoftWindowssoftwareoperating systemsMalware and Vulnerabilitieskaspersky lab

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Gregg Keizer

Computerworld (US)

Comments

Comments are now closed.

Most Popular Reviews

Follow Us

Best Deals on GoodGearGuide

Shopping.com

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Shopping.com

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?