Microsoft Flaw Could Affect Homeland Security

In July, Microsoft announced a "critical" flaw in several of its operating systems—including Windows XP—and now the U.S. Department of Homeland Security (DHS) is expressing worries about the vulnerabilities to cyber attacks.

Hackers got to work immediately upon learning of the flaw that also appeared in Windows 2000, Windows 98, Windows 98 Second Edition, Windows Me, Windows NT 4.0 Server and Windows Server 2003, with experts saying that the window of opportunity to place security patches on the flaws is quickly closing.

The Department of Homeland Security (DHS) itself, which recently signed a multi-million dollar contract that makes Microsoft its principal software provider, is now scrambling to make sure the patches are in place to protect its own vulnerable systems.

The agency ratcheted up the level of warning that Microsoft originally placed on the flaw, which creates a vulnerability in the Windows Remote Procedure Call (RPC) that could allow for code to be executed maliciously.
The Department of Homeland Security warned, "several working exploits are now in widespread distribution on the Internet." Agency alerts compared the potential exploit to the Code Red and Slammer viruses/worms.

An agency spokesman was quoted on InternetNews.com as saying the agency is watching the situation closely. "We're seeing an Internet-wide increase in probing that could be a search for vulnerable computers," said DHS’s David Wray. "It could be a precursor and it bears continued watching... It certainly could be serious. It could lead to the distribution of destructive, malicious code and it could cause considerable disruption."

Microsoft disclosed the flaw in July, as part of three new flaw disclosures—warnings No. 23, 24 and 25 this year. The critical flaw could allow a "buffer overrun," which Microsoft’s Web site describes as "an attack in which a malicious user exploits an unchecked buffer in a program and overwrites the program code with their own data. If the program code is overwritten with new executable code, the effect is to change the program's operation as dictated by the attacker. If overwritten with other data, the likely effect is to cause the program to crash."

The buffer overrun, found in the HTML converter in the Windows operating system, was the most serious of the reported flaws. Hackers could manipulate the vulnerability to spread the code through HTML in an e-mail or by developing a web page that causes the code to be automatically downloaded by visitors.

What makes the flaw particularly daunting is that it can be set in motion without the user doing anything to cause it. Microsoft posted a patch for the vulnerability on its Web site. Another difficult aspect is this flaw’s ability to affect both servers and desktop computers simultaneously.

"We're very concerned," Dan Ingevaldson, an engineering manager with Altanta-based Internet Security Systems, Inc., told IntnernetNews.com. "We think there's a risk here to the entire Internet."

You may like these other stories...

Regulatory compliance, risk management and cost-cutting are the big heartburn issues for finance execs in the C-suite. Yet financial planning and analysis—a key antacid—is insufficient.That's just one of the...
Continuing its efforts to simplify accounting procedures, the FASB has issued a proposed Accounting Standards Update on customer fees paid in a cloud computing arrangement. The newly-proposed update (Intangibles—...
How are you planning? What tools do you use (or fail to use) for forecasting? PlanGuru is a business budgeting, forecasting, and performance review software company based in White Plains, N.Y. AccountingWEB recently spoke...

Already a member? log in here.

Upcoming CPE Webinars

Aug 26
This webcast will include discussions of recently issued, commonly-applicable Accounting Standards Updates for non-public, non-governmental entities.
Aug 28
Excel spreadsheets are often akin to the American Wild West, where users can input anything they want into any worksheet cell. Excel's Data Validation feature allows you to restrict user inputs to selected choices, but there are many nuances to the feature that often trip users up.
Sep 9
In this session we'll discuss the types of technologies and their uses in a small accounting firm office.
Sep 11
This webcast will include discussions of commonly-applicable Clarified Auditing Standards for audits of non-public, non-governmental entities.