Article

Microsoft issues temporary fix for Windows Shell zero-day

Robert Westervelt, News Director

Microsoft has issued a temporary fix to prevent attackers from exploiting a serious zero-day vulnerability in Windows Shell that security researchers warn is being targeted by cybercriminals in limited attacks.

    Requires Free Membership to View

We encourage customers to review this new information and to evaluate it for their environment while our teams continue their work to develop a security update that addresses this vulnerability.
Christopher Budd,
security response communications leadMicrosoft

Christopher Budd, security response communications lead at Microsoft said a Windows Shell "Fix It" automates the process of implementing the recommended workaround, which disables .LNK and .PIF file functionality. Administrators should test the workaround before widely deploying it, Budd said.

"We encourage customers to review this new information and to evaluate it for their environment while our teams continue their work to develop a security update that addresses this vulnerability," Budd wrote on the Microsoft Security Response Center blog.

Microsoft issued an advisory last week, warning that it has detected limited attacks targeting a flaw in the Windows Shell. The vulnerability affects all versions of Windows. It enables attackers to exploit malicious code when a shortcut icon is displayed. The attack can be carried out via a USB drive, remotely through network shares and WebDav or in specific document types that support embedded shortcuts, Microsoft said.

The vulnerability was discovered in June by Belarus-based antivirus vendor VirusBlokAda. The malware installs two drivers designed to make the malware undetectable, the company said.

Rahul Kashyap, a vulnerability research manager at McAfee Inc. said the flaw can be exploited relatively easily. An attacker would need to make a malicious shortcut file and then lure the user into navigating to a Windows folder or removable drive that contains the booby trapped file. If successful, the attacker could gain complete control over a vulnerable Windows computer.

Microsoft updates:
July - Microsoft fixes serious zero-day flaw, Outlook bug -  Microsoft repairs a zero-day vulnerability being actively targeted in the wild. Also, a repair for Office Outlook should be deployed quickly, experts say.

June - Microsoft emphasizes three critical updates on patch-heavy Tuesday: During a Patch Tuesday full of almost a dozen bulletins and 34 vulnerabilities, Microsoft told customers to focus especially on three critical updates. 

McAfee and other antimalware vendors are developing signatures to detect the vulnerability. But Roel Schouwenberg, a senior antivirus researcher at Kaspersky Lab said creating generic signatures that don't create false positives is a difficult process. Microsoft may also have trouble developing an effective patch, Schouwenberg wrote on Kaspersky Lab's Securelist blog.

"There doesn't seem to be any security model associated with how Windows handles shortcuts," Schouwenberg wrote. "This whole situation reminds me a bit of vulnerabilities in the WMF format – it's another case of legacy code coming back to bite Microsoft."

Schouwenberg anticipates the vulnerability to be more broadly exploited while Microsoft works on a permanent patch.

Worm uses zero-day to target SCADA systems
Security researchers have identified Stuxnet, a worm that uses the Windows vulnerability to target Siemens SCADA system software. In a detailed analysis of Stuxnet, Symantec Corp. security researcher Liam O Murchu said a rootkit hides the malware files at the Windows kernel level. The malware is designed to update itself, check if certain antivirus applications are running, scan the network for servers and communicate with a command and control server, according to Murchu.


There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: