December 20, 2001 1:00 PM PST

Microsoft issues patch for "serious" XP hole

Microsoft may have touted Windows XP as the most secure operating system it has made, but the company on Thursday released a bug fix for a security hole that could leave some people's systems open to malicious attack.

Microsoft is recommending that every Windows XP customer apply the patch immediately. Customers using Windows 98, Windows 98 Second Edition and Windows ME with the "Universal Plug and Play" (UPnP) service up and running should also use the patch, the company said.

UPnP is Microsoft software that uses Internet protocols to allow devices such as computers, scanners and printers to automatically discover one another so they can communicate. Microsoft said an attacker who exploited the hole could take over computers on such a network. Depending on the skills of the attackers, they could take complete control of the PC--such as viewing or deleting files--or launch "denial-of-service" attacks, which flood a person's PC with data, crippling it.

Windows users can download the patch from Microsoft's Web site.

A Microsoft executive said Windows XP comes with the UPnP feature turned on, so every XP user needs the patch.

"This is a serious vulnerability. People running Windows XP need to put the patch on right away," said Scott Culp, manager of Microsoft's Security Response Center.

Culp said users of Windows ME or Windows 98 only need the patch if they are running UPnP. Windows ME was released with UPnP built in, but the feature is turned off when customers install that operating system. Windows 98 doesn't have UPnP built in, so users of the OS don't need the patch unless they have installed UPnP separately, he added.

UPnP is networking software that is slowly beginning to catch on among tech companies and computer users. Printer makers, for example, have begun supporting it so that printers can easily connect to PCs on a network.

UPnP is Microsoft's vision of allowing computers, printers and other peripherals to automatically find one another and communicate without consumers having to configure the computers. With everything connected, people in the house could videoconference or play multiplayer video games, for example.


Gartner analysts say the 2001 holiday season hasn't been merry for early adopters of Microsoft's Windows XP.

see commentary

Culp said there are several ways people can exploit the security hole in UPnP. Someone who knows the Internet Protocol (IP) address of a specific PC can gain control of the computer through the Internet if the network doesn't have firewall security installed. Most corporations and many consumers, however, have firewalls installed to block these types of break-ins, he said.

More seriously, hackers who are inside the network can take over a PC without needing to know the PC's IP address. That's the case with cable Internet access, where people in the neighborhood share the same cable network, Culp said.

"With most cable modem users, there's a physical wire that feeds an entire neighborhood, and someone from that wire could attack anyone without needing to know the IP address," he said. "The attacker can take control of the PC and have access to all the files. They might as well be sitting in front of the keyboard."

The flaws were discovered by Aliso Viejo, Calif.-based security company eEye Digital Security and reported to Microsoft about six weeks ago, said Marc Maiffret, eEye's chief hacking officer.

Although describing the flaws as "the worst default security vulnerability in Windows ever," Maiffret credited the company for working quickly and intelligently to stem possible damage.

"Microsoft made a really good effort to work with us and get the patch ready in a coordinated way," he said. "Microsoft understands you're never going to be perfect; you have to have a mechanism in place to react to these things quickly and comprehensively when they happen."

Maiffret predicted hackers would develop and release tools to exploit the UPnP vulnerability within a week or two. But he said the buffer overflow flaw was so technically complex that attacks based on it were unlikely to become widespread. "I think the people skilled enough to exploit this will keep the exploit to themselves," he said.

2 comments

Join the conversation!
Add your comment
my laptop is running slow and I am looking on ways to make it run like it did when is was new---
Posted by rontopp (2 comments )
Reply Link Flag
DO NOT RUN THIS PATCH without a full backup. There are a number of people (including my brother) who are getting BSODs, telling them "Session Manager Initialization" failure. There's a possible solution that was used when something similar happened with SP2, but it's not tested or guaranteed. If you install this patch you may have to rebuild your system (as my brother is doing after 6 hours of futility). BE VERY CAREFUL.

BACK UP BACK UP BACK UP
Posted by qprize (237 comments )
Reply Link Flag
 

Join the conversation

Add your comment

The posting of advertisements, profanity, or personal attacks is prohibited. Click here to review our Terms of Use.

What's Hot

Discussions

Shared

RSS Feeds

Add headlines from CNET News to your homepage or feedreader.