HOME     MENU     SEARCH     NEWSLETTER    
NEWS & INFORMATION FOR TECHNOLOGY PURCHASERS. UPDATED 14 MINUTES AGO.
You are here: Home / Enterprise I.T. / Win XP, Server 2003 Zero-Days Found
Neustar, Inc.
Protect your website & network using real-time information & analysis
www.neustar.biz
Win XP, Server 2003 Zero-Day Exploits Use Adobe Reader
Win XP, Server 2003 Zero-Day Exploits Use Adobe Reader
By Jennifer LeClaire / NewsFactor Network Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
DECEMBER
02
2013
Another month, another zero-day vulnerability. Microsoft is investigating new reports of a vulnerability in a kernel component of Windows XP and Windows Server 2003, accessed using older versions of Adobe Reader.

Redmond said it is aware of limited, targeted attacks that attempt to exploit the flaw. The good news: The company's investigation of the vulnerability has verified that it does not affect customers who are using operating systems newer than Windows XP and Windows Server 2003.

"The vulnerability is an elevation-of-privilege vulnerability. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode," Microsoft explained in an alert. "An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights."

Mitigating Factors

There is one mitigating factor that could work in an enterprise's advantage. An attacker needs to have valid log-on credentials and be able to sign in locally to exploit the vulnerability. In other words, the vulnerability could not be exploited remotely or by anonymous users.

There's also a workaround: For environments with non-default, limited user privileges, Microsoft said disabling NDProxy.sys will cause certain services that rely on Windows Telephony Application Programming Interfaces to not function. Services that will no longer work include Remote Access Service, dial-up networking, and virtual private networking.

Redmond is working with partners in its Microsoft Active Protections Program to provide information that they can use to deliver broader protections to customers. Microsoft promised to take the appropriate action to protect customers when the investigation is complete and did not rule out an out-of-cycle patch.

Adobe Reader Connection

We turned to Wolfgang Kandek, CTO at Qualys, for his take on the vulnerability. He told us the exploit is being abused in the wild in conjunction with the Adobe Reader vulnerability that had a fix published in August 2013: "Users that have the latest version of Adobe Reader are immune to the attack, as well as users that are running on Windows Vista or later."

FireEye was the first to uncover the vulnerability. The security research firm said the exploit targets Adobe Reader 9.5.4, 10.1.6, 11.0.02 and earlier versions on Windows XP SP3.

"Those running the latest versions of Adobe Reader should not be affected by this exploit," security researchers Xiaobo Chen and Dan Caselden of FireEye wrote in a blog post. "Post exploitation, the shellcode decodes a PE payload from the PDF, drops it in the temporary directory, and executes it."

Tell Us What You Think
Comment:

Name:

Like Us on FacebookFollow Us on Twitter
TOP STORIES NOW
MAY INTEREST YOU
Neustar, Inc. (NYSE: NSR) is a trusted, neutral provider of real-time information and analysis to the Internet, telecommunications, information services, financial services, retail, media and advertising sectors. Neustar applies its advanced, secure technologies in location, identification, and evaluation to help its customers promote and protect their businesses. More information is available at www.neustar.biz.
MORE IN ENTERPRISE I.T.
Product Information and Resources for Technology You Can Use To Boost Your Business
© Copyright 2014 NewsFactor Network, Inc. All rights reserved. Member of Accuserve Ad Network.