Windows NT/2000 hole can let attacker take over systems

A recently discovered security vulnerability in a software debugging component of Microsoft Corp.'s Windows NT and 2000 operating systems can allow an attacker to elevate their privileges on a system and take the system over, according to intrusion detection system vendor Entercept Security Technologies Inc. An exploit is already circulating among potential attackers, the company said.

An initial posting about the issue was made to the Bugtraq security list on March 14th.

The vulnerability relates to the way Windows NT and 2000 handle debug processes, according to Robin Matlock, senior vice president of marketing and services at Entercept. Normally, when a user initiates a debug session, that session is handed off to a software gateway that determines whether the request has the proper permission to be passed on to another software component, the Session Manager, she said. If the request is passed on, it is then executed in privileged mode, she said.

The security flaw, however, allows any program to initiate a debugging session and bypass the gateway step, thereby operating in privileged mode even if the user does not have that access, she said. This could allow an attacker to read, modify and delete files, she said.

Though there is an exploit in existence in the attacker community, the security hole cannot be easily attacked over a network, Matlock said. The exploit has been online for about a week, she said.

Microsoft does not yet have a patch for the vulnerability, though it is working on one, according to a statement from the company. Microsoft was contacted on March 11 about the issue, according to the company. In its statement, Microsoft said that "responsible security researchers work with the vendor of a suspected vulnerability issue to ensure that countermeasures are developed before the issue is made public and customers are needlessly put at risk."

Entercept chose to release information about the vulnerability in the absence of a patch because of the exploit, said Matlock.

"If the hacking community knows about it and the user community doesn't, that doesn't help anyone," she said. Entercept has a responsibility to help educate users, she added.

The education process in this instance may be difficult, however, as standard intrusion detection systems will not detect exploitation of this vulnerability, according to Matlock. In the view of most host- and behavior-based intrusion detection systems the actions taken to exploit the hole will seem normal, thus bypassing their protection, she said.

Users can protect themselves by downloading workaround code from a the Web site of a German computer security organization located at http://cert.uni-stuttgart.de/people/fw/tools/chsystem.

Entercept's security bulletin recommends the use of its products as the best way to prevent exploitation of the vulnerability.

In a written statement, Microsoft said it is currently investigating the issue.

"It's worth noting that third parties can choose to post possible workaround procedures for an alleged issue without completing the intensive investigation undertaken by the vendor," the statement read.

"We are concerned that this report has gone public before we've had a fair chance to investigate it - Its publication may cause our customers needless confusion and apprehension or possibly even put them at risk," Microsoft said.

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Sam Costello

Computerworld
Show Comments

Cool Tech

Breitling Superocean Heritage Chronographe 44

Learn more >

SanDisk MicroSDXC™ for Nintendo® Switch™

Learn more >

Toys for Boys

Family Friendly

Panasonic 4K UHD Blu-Ray Player and Full HD Recorder with Netflix - UBT1GL-K

Learn more >

Stocking Stuffer

Razer DeathAdder Expert Ergonomic Gaming Mouse

Learn more >

Christmas Gift Guide

Click for more ›

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Walid Mikhael

Brother QL-820NWB Professional Label Printer

It’s easy to set up, it’s compact and quiet when printing and to top if off, the print quality is excellent. This is hands down the best printer I’ve used for printing labels.

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?