X
Tech

Microsoft warns of 'critical' Windows flaw

Gives hackers full control of Windows systems
Written by Joris Evers, Contributor

Gives hackers full control of Windows systems

Cyber crooks are using a yet-to-be-patched security flaw in certain Windows versions to attack computers running the operating systems, Microsoft has warned.

The attacks target Windows 2000 Server and Windows Server 2003 systems through a hole in the domain name system, or DNS, service, Microsoft said in a security advisory. The attacks happen by sending rigged data to the service, which by design is meant to help map text-based internet addresses to numeric internet protocol (IP) addresses.

Microsoft said in the advisory: "An anonymous attacker could try to exploit the vulnerability by sending a specially crafted RPC packet to an affected system."

RPC, or remote procedure call, is a protocol applications use to request services from programs on another computer in a network. RPC has been involved in several security bugs before, including in the vulnerability that let the Blaster worm spread.

The French Security Incident Response Team deems the Windows DNS vulnerability 'critical', its highest rating.

The DNS and RPC warning comes days after Microsoft issued its April security patches. At the same time security experts have issued warnings on multiple zero-day flaws in Office and another one in Windows.

The latest vulnerability is a stack-based buffer overrun, Microsoft said. This is a common type of coding problem that has caused many headaches for Microsoft and Windows users. A successful attack will give full control over a vulnerable machine without any user interaction, Microsoft said.

Microsoft said there are "limited attacks" that exploit the issue. The software maker is finishing a security update for Windows to repair the problem, it added. Microsoft did not say when it plans to release the update. The company's next Patch Tuesday is on 8 May, though if attacks increase a patch could be released out of that cycle.

While it works on the fix, Microsoft suggests several workarounds for users of affected Windows versions. These include disabling remote management over RPC capability for DNS servers, blocking specific data ports using a firewall and enabling advanced filtering. Security firm Symantec has urged users to apply the workarounds.

In an alert sent to subscribers of its DeepSight security intelligence service, Symantec said: "Customers are advised to... apply the appropriate workarounds as soon as possible, in the event that the attacks become more widespread."

Windows XP and Windows Vista are not impacted by the DNS flaw. Windows 2000 Server Service Pack 4, Windows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2 are vulnerable, Microsoft said.

Joris Evers writes for CNET News.com

Editorial standards