Americas

  • United States

Asia

Oceania

by Dave Gradijan

Patch Tuesday Preempted by Patch for Serious Windows Attacks

News
Apr 02, 20072 mins
Build AutomationCSO and CISO

Microsoft has decided to rush out a fix for a flaw in its Windows operating system, saying the problem has become too serious to ignore.

The flaw, which will be patched on Tuesday, was originally disclosed to Microsoft in December, but it was not publicly reported until Wednesday of last week. The bug lies in the way Windows processes .ani Animated Cursor files, which are used to create cartoon-like cursors in Windows.

Since the first attacks based on this flaw were reported, security experts say that more than 100 websites are now serving up malicious webpages that take advantage of the bug, and a new worm has begun spreading in China, according to Symantec.

On Saturday, hackers posted sample code that could be used to exploit the flaw, and shortly after that, Microsoft decided to rush out the emergency patch instead of waiting for its next regularly scheduled set of security updates, due April 10.

“Over this weekend attacks against this vulnerability have increased somewhat,” Microsoft Program Manager Christopher Budd wrote Sunday on the company’s Security Response Center blog. “Additionally, we are aware of public disclosure of proof-of-concept code. In light of these points, and based on customer feedback, we have been working around the clock to test this update and are currently planning to release the security update that addresses this issue on Tuesday.”

Such early patches are not unprecedented. Microsoft released similar “out-of-cycle” fixes in January and September last year.

For those who cannot wait until Tuesday, two unofficial patches for the problem are now available. The first is from eEye Digital Security, and the second was released on Sunday by a volunteer group called the Zeroday Emergency Response Team.

Microsoft’s patch has been in the works since security vendor Determina brought the flaw to Microsoft’s attention late last year, Budd wrote. “We’ve been working on our investigation and a security update since then.”

-Robert McMillan, IDG News Service