Microsoft has released an out-of-band patch for two severe flaws in Windows Defender. The flaws were discovered by the National Cyber Security Centre (NCSC), a unit of the UK's spy agency GCHQ, which dispenses cyberdefense advice to the government and public.
Just last week, for example, the NCSC told UK agencies hosting information classified 'secret' never to use any Russian antivirus, including Kaspersky, due to the risk of Russian cyber-spies using it as a backdoor.
The NCSC's probe of Microsoft's antivirus uncovered two critical remote code execution bugs in the core of Windows Defender, called Microsoft Malware Protection Engine.
The bugs, tracked as CVE-2017-11937 and CVE-2017-11940, are similar to the "crazy-bad" bug Google's Project Zero disclosed in May, which could be exploited by having the engine process a specially crafted file. The technique could lead to a complete system compromise.
The two new bugs can lead to a memory corruption when the Malware Protection Engine scans a particular attack file.
"An attacker who successfully exploited this vulnerability could execute arbitrary code in the security context of the LocalSystem account and take control of the system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights," said Microsoft.
An attacker can perform the exploit by leading a target to a malicious website or by sending the specially crafted file as an email or instant message, which the malware engine would automatically scan when the file is opened.
An attacker could also upload the attack file to a shared location on a server that the engine scans.
As with the earlier vulnerability, the two bugs could be more dangerous to systems where real-time protection is on, because the engine is configured to automatically scan all files. On systems where real-time protection is off, the attacker would need to wait for a scheduled scan to launch the attack.
The bugs affect Windows Defender for all supported Windows PC and server platforms, as well as Windows Intune Endpoint Protection, Security Essentials, Forefront, Endpoint Protection, and Exchange Server 2013 and 2016.
Fortunately, Microsoft says the bugs have not been publicly disclosed and are not known to have been exploited.
Microsoft notes that typically admins won't need to take action since updates will be applied by the system that affected products use to detect and deploy updates. They will be available within 48 hours of release.
Google's Project Zero researchers have reported a total of 10 bugs this year in the Microsoft Malware Protection Engine, evenly split between remote code execution and denial-of-service flaws.
Previous and related coverage
Systems running the Windows 10 Anniversary Update were shielded from two exploits even before Microsoft had issued patches for them, its researchers have found.
The vulnerability has been dubbed the worst Windows remote code execution flaw in recent memory.
The malware, often used by nation states, exploits a flaw in Office, and it's known to have targeted Russians.
Read more on security
- Security: Making yourself a hard target for hackers is easier than you think
- Searching for the perimeter in cloud security: From microservices to chaos
- Industrial firms fail to adopt basic security measures against hackers
- A giant botnet behind one million malware attacks a month just got shut down
- Password-sharing politicians prompt security row
- Security finally got the awareness it needed in 2017. Now what? (CNET)
- 9 best practices to improve security in industrial IoT (TechRepublic)