News

Microsoft Faced Big Issues in Fixing SMB Hole

Microsoft has come clean and confirmed that it took seven years to deliver its Server Message Block (SMB) fix.

Microsoft has come clean and confirmed that it took seven years to deliver its Server Message Block (SMB) fix. The SMB fix is part of Microsoft's November security patch, released on Tuesday.

Redmond had a problem back then, according Security Response Center spokesperson Christopher Budd in a blog post. Basically, when the issue of an exploit affecting the application-level network protocol first came up in 2001, the software giant couldn't "make changes to address the issue without negatively impacting [other] network-based applications."

Providing a hotfix might have resulted in glitches that would have rendered "many, or nearly all, customers' network-based applications inoperable," Budd wrote.

The SMB vulnerability is related to a previously disclosed SMBRelay attack. Intruders equipped with a copy of the published exploit can get onto a workstation almost unnoticed and read and write files. They can also modify the Windows registry, delete objects and access e-mails, among other actions.

As a stop-gap over the past seven years, Microsoft recommended SMB signing, which is a security mechanism in the SMB protocol that can be used for authentication purposes. The signing function had been available before 2001 in Microsoft Windows NT 4.0 Service Pack 3 and Microsoft Windows 98.

With the SMB vulnerability fix in November's patch release, security experts who followed the issue are breathing a sigh of relief. Not only has a fix come out, but there now is a fuller explanation of the problem.

No one was more relieved than former Microsoft security staffer and current Chief Technology Officer at Shavlik Technologies, Eric Schultze. Having brought the problem to the attention of the software giant, Schultze had come to view the SMB exploit as a pebble in his shoe over the years.

"It's been a ride, as I had been pushing for a fix since 2001," he said. "We even ended up having a meeting with the OS and Internet Explorer teams. At first, we thought it was mitigated in IE, but that only worked for non-OS calls to SMB. Well, it looks like [Microsoft] has finally seen the light."

These days, vulnerabilities to Microsoft product and services rarely become public before Microsoft delivers a patch. And over the years, chances of widespread exploitation have become slimmer due to quicker response times from Microsoft.

Budd believes the Microsoft team got it right with the November patch.

"[The patch] addresses the SMBRelay issue but does so in a way that doesn't have the negative impact on applications that we originally believed addressing this issue would have," he wrote.

About the Author

Jabulani Leffall is an award-winning journalist whose work has appeared in the Financial Times of London, Investor's Business Daily, The Economist and CFO Magazine, among others.

Featured

  • Closeup of the new Copilot keyboard key

    Microsoft Updates Copilot To Add Context-Sensitive Agents to Teams, SharePoint

    Microsoft has rolled out a new public preview for collaborative "always on" agents in Microsoft 365 Copilot, bringing enhanced, context-aware tools into Teams channels, meetings, SharePoint sites, Planner workstreams and Viva Engage communities.

  • Windows 365 Cloud Apps Now Available for Public Preview

    Microsoft announced this week that Windows 365 Cloud Apps are now available for public preview. This aims to allow IT administrators to stream individual Windows applications from the cloud, removing the need to assign Cloud PCs to every user.

  • Report: Security Initiatives Can't Keep Pace with Cloud, AI Boom

    The increasingly fast adoption of hybrid, multicloud, and AI systems is easily outgrowing existing security measures, according to a recent global survey by the Cloud Security Alliance (CSA) and exposure management firm Tenable.

  • World Map Image

    Microsoft Taps Nebius in $17B AI Infrastructure Deal To Alleviate Cloud Strain

    Microsoft has signed a five-year, $17.4 billion agreement with Amsterdam-based Nebius Group to expand its AI computing capabilities through third-party GPU infrastructure.