Microsoft Flaw Could Affect Homeland Security

In July, Microsoft announced a "critical" flaw in several of its operating systems—including Windows XP—and now the U.S. Department of Homeland Security (DHS) is expressing worries about the vulnerabilities to cyber attacks.

Hackers got to work immediately upon learning of the flaw that also appeared in Windows 2000, Windows 98, Windows 98 Second Edition, Windows Me, Windows NT 4.0 Server and Windows Server 2003, with experts saying that the window of opportunity to place security patches on the flaws is quickly closing.

The Department of Homeland Security (DHS) itself, which recently signed a multi-million dollar contract that makes Microsoft its principal software provider, is now scrambling to make sure the patches are in place to protect its own vulnerable systems.

The agency ratcheted up the level of warning that Microsoft originally placed on the flaw, which creates a vulnerability in the Windows Remote Procedure Call (RPC) that could allow for code to be executed maliciously.
The Department of Homeland Security warned, "several working exploits are now in widespread distribution on the Internet." Agency alerts compared the potential exploit to the Code Red and Slammer viruses/worms.

An agency spokesman was quoted on InternetNews.com as saying the agency is watching the situation closely. "We're seeing an Internet-wide increase in probing that could be a search for vulnerable computers," said DHS’s David Wray. "It could be a precursor and it bears continued watching... It certainly could be serious. It could lead to the distribution of destructive, malicious code and it could cause considerable disruption."

Microsoft disclosed the flaw in July, as part of three new flaw disclosures—warnings No. 23, 24 and 25 this year. The critical flaw could allow a "buffer overrun," which Microsoft’s Web site describes as "an attack in which a malicious user exploits an unchecked buffer in a program and overwrites the program code with their own data. If the program code is overwritten with new executable code, the effect is to change the program's operation as dictated by the attacker. If overwritten with other data, the likely effect is to cause the program to crash."

The buffer overrun, found in the HTML converter in the Windows operating system, was the most serious of the reported flaws. Hackers could manipulate the vulnerability to spread the code through HTML in an e-mail or by developing a web page that causes the code to be automatically downloaded by visitors.

What makes the flaw particularly daunting is that it can be set in motion without the user doing anything to cause it. Microsoft posted a patch for the vulnerability on its Web site. Another difficult aspect is this flaw’s ability to affect both servers and desktop computers simultaneously.

"We're very concerned," Dan Ingevaldson, an engineering manager with Altanta-based Internet Security Systems, Inc., told IntnernetNews.com. "We think there's a risk here to the entire Internet."


Already a member? log in here.

Editor's Choice

Upcoming CPE Webinars

Dec 3The materials discuss the concepts and principles in the AICPA’s new special purpose framework.
Dec 8Kristen Rampe will cover how to diffuse the tension in challenging situations in this one-hour webinar.
Dec 9A key component to improving your firm’s workflow efficiency while enhancing your profitability at the same time is how you leverage emerging technologies.
Dec 16Kristen Rampe will give tips on how to bring confidence into the room and build a valuable network.