Microsoft Flaw Could Affect Homeland Security
In July, Microsoft announced a "critical" flaw in several of its operating systems—including Windows XP—and now the U.S. Department of Homeland Security (DHS) is expressing worries about the vulnerabilities to cyber attacks.
Hackers got to work immediately upon learning of the flaw that also appeared in Windows 2000, Windows 98, Windows 98 Second Edition, Windows Me, Windows NT 4.0 Server and Windows Server 2003, with experts saying that the window of opportunity to place security patches on the flaws is quickly closing.
The Department of Homeland Security (DHS) itself, which recently signed a multi-million dollar contract that makes Microsoft its principal software provider, is now scrambling to make sure the patches are in place to protect its own vulnerable systems.
The agency ratcheted up the level of warning that Microsoft originally placed on the flaw, which creates a vulnerability in the Windows Remote Procedure Call (RPC) that could allow for code to be executed maliciously.
The Department of Homeland Security warned, "several working exploits are now in widespread distribution on the Internet." Agency alerts compared the potential exploit to the Code Red and Slammer viruses/worms.
An agency spokesman was quoted on InternetNews.com as saying the agency is watching the situation closely. "We're seeing an Internet-wide increase in probing that could be a search for vulnerable computers," said DHS’s David Wray. "It could be a precursor and it bears continued watching... It certainly could be serious. It could lead to the distribution of destructive, malicious code and it could cause considerable disruption."
Microsoft disclosed the flaw in July, as part of three new flaw disclosures—warnings No. 23, 24 and 25 this year. The critical flaw could allow a "buffer overrun," which Microsoft’s Web site describes as "an attack in which a malicious user exploits an unchecked buffer in a program and overwrites the program code with their own data. If the program code is overwritten with new executable code, the effect is to change the program's operation as dictated by the attacker. If overwritten with other data, the likely effect is to cause the program to crash."
The buffer overrun, found in the HTML converter in the Windows operating system, was the most serious of the reported flaws. Hackers could manipulate the vulnerability to spread the code through HTML in an e-mail or by developing a web page that causes the code to be automatically downloaded by visitors.
What makes the flaw particularly daunting is that it can be set in motion without the user doing anything to cause it. Microsoft posted a patch for the vulnerability on its Web site. Another difficult aspect is this flaw’s ability to affect both servers and desktop computers simultaneously.
"We're very concerned," Dan Ingevaldson, an engineering manager with Altanta-based Internet Security Systems, Inc., told IntnernetNews.com. "We think there's a risk here to the entire Internet."
Voice of the Editor
Which isn’t completely true. I mean, occasionally I drop by when I manage to sneak out of the nonstop frat party over at Going Concern, but I’m mostly a wallflower over there. I’m happy to say that I’ve been given express permission (or explicit orders, if you like) to wander over here to AccountingWEB more often.
Why is that, you might ask? My job is to replace the irreplaceable Gail Perry as Editor-in-Chief. What does that mean? I don’t really know! I think it’ll be fun getting a feel for things, throwing in my own thoughts here and there, and listening to the discussions you’re having about the accounting profession.