Microsoft downplays threat of new Windows zero-day

Hasn't found a way to hijack PCs using SMB bug

Microsoft yesterday downplayed the threat posed to Windows users by a recently-revealed vulnerability, saying that it was unlikely the bug could be exploited to compromise a computer.

The flaw in the Windows Server Message Block (SMB) network and file-sharing protocol was disclosed Monday by someone identified only as " Cupidon-3005" on the Full Disclosure security mailing list. Cupidon-3005 posted proof-of-concept code to the list.

French and Danish researchers later said hackers might be able to exploit the bug to hijack Windows PCs.

On Wednesday, Microsoft said that wasn't so.

"Based on our initial investigation this vulnerability cannot be leveraged for remote code execution (RCE) on 32-bit platforms," said Jerry Bryant, a general manager in the Microsoft Security Response Center (MSRC). "We are still investigating the possibility of code execution on 64-bit platforms, but so far have not found a likely scenario that would result in reliable code execution."

A successful attack that exploits the SMB bug would instead result in a "denial of service," said Bryant, using the term that describes a Window crash that would require rebooting the PC. Windows crashes often inform users of the dire situation with the infamous "Blue Screen of Death."

In a explanatory blog post , MSRC engineer Mark Wodrich echoed Bryant's take on the likelihood of remote code execution, saying that it was impossible on a 32-bit version of Windows due to memory limitations, and feasible on 64-bit Windows only if more than 8GB of memory was present.

Even then, said Wodrich, "We feel that triggering any such timing condition reliably will be very difficult."

HD Moore, chief security at Rapid7 and the creator of the open-source Metasploit penetration toolkit, chimed in as well.

"We haven't seen any solid examples of code execution yet, even if it turns out to be possible," Moore said in an e-mail reply to questions Wednesday. He added that a Metasploit researcher was also examining the bug and Cupidon-3005's published attack code to see if a reliable Metasploit exploit module could be crafted.

All versions of Windows contain the bug, said Wodrich, but servers running as the Primary Domain Controller (PDC) -- the system that controls the network domain -- are most vulnerable.

Microsoft pegged the vulnerability's Exploitability Index ranking at "3," meaning the company doesn't expect reliable attack code will appear in the next 30 days.

Some researchers chastised Microsoft for downplaying the threat.

"Microsoft is now calling any hard-to-exploit vulnerability (e.g. SMB) a 'Denial of Service'! What's next?" asked French security firm Vupen in a tweet earlier today .

"They've been doing this forever, MSRC is about managing PR incidents, not improving security," said Tavis Ormandy in a reply to Vupen's tweet.

Ormandy, a Google security engineer, has butted heads with Microsoft before -- most notably last summer, when he released exploit code for a bug in Windows' Help and Support Center after he said Microsoft refused to set a patch deadline.

Microsoft's Bryant said the MSRC researchers are will investigating the bug, and would issue a patch or a workaround to protect users.

Although the company's next regularly-scheduled Patch Tuesday is three weeks away, it's unlikely a fix will be delivered then unless a large number of in-the-wild attacks exploiting the vulnerability appear.

Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer or subscribe to Gregg's RSS feed . His e-mail address is gkeizer@computerworld.com .

Read more about security in Computerworld's Security Topic Center.

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection

Tags securityMicrosoftoperating systemssoftwareWindows

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Gregg Keizer

Computerworld (US)
Show Comments

Cool Tech

SanDisk MicroSDXC™ for Nintendo® Switch™

Learn more >

Breitling Superocean Heritage Chronographe 44

Learn more >

Toys for Boys

Family Friendly

Panasonic 4K UHD Blu-Ray Player and Full HD Recorder with Netflix - UBT1GL-K

Learn more >

Stocking Stuffer

Razer DeathAdder Expert Ergonomic Gaming Mouse

Learn more >

Christmas Gift Guide

Click for more ›

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Edwina Hargreaves

WD My Cloud Home

I would recommend this device for families and small businesses who want one safe place to store all their important digital content and a way to easily share it with friends, family, business partners, or customers.

Walid Mikhael

Brother QL-820NWB Professional Label Printer

It’s easy to set up, it’s compact and quiet when printing and to top if off, the print quality is excellent. This is hands down the best printer I’ve used for printing labels.

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?