Microsoft Flaw Could Affect Homeland Security

In July, Microsoft announced a "critical" flaw in several of its operating systems—including Windows XP—and now the U.S. Department of Homeland Security (DHS) is expressing worries about the vulnerabilities to cyber attacks.

Hackers got to work immediately upon learning of the flaw that also appeared in Windows 2000, Windows 98, Windows 98 Second Edition, Windows Me, Windows NT 4.0 Server and Windows Server 2003, with experts saying that the window of opportunity to place security patches on the flaws is quickly closing.

The Department of Homeland Security (DHS) itself, which recently signed a multi-million dollar contract that makes Microsoft its principal software provider, is now scrambling to make sure the patches are in place to protect its own vulnerable systems.

The agency ratcheted up the level of warning that Microsoft originally placed on the flaw, which creates a vulnerability in the Windows Remote Procedure Call (RPC) that could allow for code to be executed maliciously.
The Department of Homeland Security warned, "several working exploits are now in widespread distribution on the Internet." Agency alerts compared the potential exploit to the Code Red and Slammer viruses/worms.

An agency spokesman was quoted on InternetNews.com as saying the agency is watching the situation closely. "We're seeing an Internet-wide increase in probing that could be a search for vulnerable computers," said DHS’s David Wray. "It could be a precursor and it bears continued watching... It certainly could be serious. It could lead to the distribution of destructive, malicious code and it could cause considerable disruption."

Microsoft disclosed the flaw in July, as part of three new flaw disclosures—warnings No. 23, 24 and 25 this year. The critical flaw could allow a "buffer overrun," which Microsoft’s Web site describes as "an attack in which a malicious user exploits an unchecked buffer in a program and overwrites the program code with their own data. If the program code is overwritten with new executable code, the effect is to change the program's operation as dictated by the attacker. If overwritten with other data, the likely effect is to cause the program to crash."

The buffer overrun, found in the HTML converter in the Windows operating system, was the most serious of the reported flaws. Hackers could manipulate the vulnerability to spread the code through HTML in an e-mail or by developing a web page that causes the code to be automatically downloaded by visitors.

What makes the flaw particularly daunting is that it can be set in motion without the user doing anything to cause it. Microsoft posted a patch for the vulnerability on its Web site. Another difficult aspect is this flaw’s ability to affect both servers and desktop computers simultaneously.

"We're very concerned," Dan Ingevaldson, an engineering manager with Altanta-based Internet Security Systems, Inc., told IntnernetNews.com. "We think there's a risk here to the entire Internet."

You may like these other stories...

Cybersecurity is no longer the domain of an organization's IT staff. It's moved to the boardroom, and in a big way. Accountants and financial managers may have been thinking it's just the province of the tech...
You probably don't want to think about how many times you access the File menu in Excel 2010 or 2013. Personally I think Excel 2010 has the best possible File menu arrangement, other than having Print Preview grafted...
Following other recent high-profile hacking events, investigators discovered yesterday that hackers broke into the draft work paper files of several famous CPA firms. Revealing images of the scantily clad documents have been...

Already a member? log in here.

Upcoming CPE Webinars

Sep 24
In this jam-packed presentation Excel expert David Ringstrom, CPA will give you a crash-course in creating spreadsheet-based dashboards. A dashboard condenses large amounts of data into a compact space, yet enables the end user to easily drill down into details when warranted.
Sep 30
This webcast will include discussions of important issues in SSARS No. 19 and the current status of proposed changes by the Accounting and Review Services Committee in these statements.
Oct 21
Kristen Rampe will share how to speak and write more effectively by understanding your own and your audience's communication style.
Oct 23
Amber Setter will show the value of leadership assessments as tools for individual and organizational leadership development initiatives.