Vulnerability Discovered in Patched Windows 2000, XP
Secunia, an Internet security company, reports that another critical flaw has been found in Microsoft Windows. This time the flaw discovered in wholly patched Windows XP and Windows 2000, which hackers could exploit to execute harmful assaults.
Marking the flaw with a "moderately critical" label, Secunia says that it is due to a boundary error within the CFrameWnd class's "UpdateFrameTitleForDocument()" feature inside mfc42.dll. Moreover, the flaw helped in the creation of a heap overflow by passing of a very lengthy string of title to the attack prone feature.
If exploited, the flaw is capable of letting attackers execute malware assaults. The assaults helped in compromising end-users' PCs and grabbing sensitive data via social engineering tactics.
Secunia disclosed that the flaw surely existed within wholly patched Windows XP SP2/SP3 and Windows 2000 Professional SP4 versions.
However, the company states that the flaw may affect other Windows operating software too, but it is possible that Windows 7 and Windows Vista that have inbuilt security precautions may be free from exploitation. If Data Execution Prevention (DEP) is enabled in Windows XP, then the exploitation might be prevented. Certain intermediary security applications too may stop the exploitation.
Secunia states in its security advisory that the PowerZip version 7.2 Build 4010 has been identified as an attack medium for the vulnerability's exploitation.
Since a patch isn't yet available to plug the hole, Secunia advises not to access software that allow the passage of user-regulated input onto the attack prone feature.
Notably, Microsoft states that it knows about the security flaw and is working to fix it.
Jerry Bryant, Group Manager at Microsoft, said that the company was probing fresh claims from the public about a potential loophole in Windows XP and Windows 2000, as reported by CNet News on July 6, 2010.
The Manager further stated that Microsoft wasn't aware of any attack hitherto exploiting the flaw. Using the company's typical deliberation, he said that Microsoft would adopt suitable measures that could mean issuing a security update via patches the company released every month or releasing an out-of-cycle security fix.
Related article: Vulnerabilities in Web Applications Invite Hackers’ Activities
» SPAMfighter News - 16-07-2010