Remote Code Execution Flaw Fixed in Windows
- By Scott Bekker
- May 12, 2004
After burdening IT with patches for 20 vulnerabilities in its April Patch Tuesday, Microsoft offered a fix for just one vulnerability in this month's patch event.
The new vulnerability involves a flaw in the Windows Help and Support Center that could allow an attacker to remotely take complete control of a Windows XP or Windows Server 2003 system. Microsoft rated the flaw "important," one rung below "critical" on Microsoft's vulnerability severity scale. The flaw, detailed in security bulletin MS04-015, does not affect Windows 2000, Windows NT 4.0 or Windows 95/98/Me.
Although remote code execution flaws like this one are often rated critical, this vulnerability requires several responses from the potential victim, making it more difficult for an attacker to successfully execute and also difficult to automate. The attack is potentially most severe when the victimized user has administrative privileges on the system.
According to Microsoft, the flaw was discovered internally and there are no instances of anyone taking advantage of the problem so far.
The May version of Patch Tuesday, Microsoft's name for the second Tuesday of every month when it releases all its patches for the month, follows one of the most significant patch days Microsoft has ever done aside from a service pack or security rollup release.
In April, Microsoft released four security bulletins that covered 20 vulnerabilities, many of them critical. At least two of the vulnerabilities had been reported to Microsoft by outsiders more than six months before they were patched.
The security bulletin describing the flaw can be found here.
Scott Bekker is editor in chief of Redmond Channel Partner magazine.