‫ Attackers exploit unpatched flaw to hit Windows XP, Server 2003

ID: IRCNE2013112026
Date: 2013-11-30
 
According to "computerworld", attackers are exploiting a new and unpatched vulnerability in Windows XP and Windows Server 2003 that allows them to execute code with higher privileges than they have access to. The vulnerability is located in NDProxy.sys.
"An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode," Microsoft said in a security advisory published Wednesday. "An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights."
This is an elevation-of-privilege (EoP) vulnerability, not a remote code execution one, which means that attackers need to already have access to a low-privileged account on the targeted system in order to exploit it.
According to Microsoft, this vulnerability is already being exploited in "limited, targeted attacks," but doesn't affect Windows versions newer than Windows XP and Windows Server 2003.
The company provided a temporary workaround that involves disabling NDProxy.sys, but this will cause certain services which depend on TAPI, like Remote Access Service (RAS), dial-up networking and virtual private networking (VPN), to no longer work.
The exploit targets computers running Adobe Reader on Windows XP with Service Pack 3, but users who have the latest versions of Adobe Reader installed should be protected, they said.
According to the FireEye researchers, if the exploit is successful, an executable file is dropped in the Windows temporary directory and is executed.
 
 

نظرات

بدون نظر
شما برای نظر دادن باید وارد شوید

نوشته

 
تاریخ ایجاد: 9 آذر 1392

دسته‌ها

امتیاز

امتیاز شما
تعداد امتیازها:0