Categories
Uncategorized

Announcement: Security Advisory 979682 Released for Elevation of Privilege (EoP) vulnerability in the Windows kernel

Yesterday, Jerry Bryant announced here on the MSRC blog that Security Advisory 979682 Released. Click on the link for the details: essentially Security Advisory 979682 addresses an Elevation of Privilege (EoP) vulnerability in the Windows kernel, affecting all currently supported versions of 32-bit Windows. Please note that 64-bit versions of Windows, including Windows Server 2008 R2, are not affected.

As noted, we’re not currently aware of any active attacks against this vulnerability and as Jerry noted…

"… [we] believe risk to customers, at this time, is limited. We continue to recommend customers review the mitigations and workarounds detailed in the Security Advisory.

"We are also working with our Microsoft Active Protections Program (MAPP) partners to help provide broader protections for customers.

"Our teams are continuing to work on an update and we will take appropriate action to protect customers when the update has met the quality bar for broad distribution. That may include releasing the update out-of-band."

For more details on the Security Advisory you can subscribe to our comprehensive alerts here to receive email when there’s new information. The team will also post updates on the MSRC Blog.

 

Tags: IE, Security, what I read, Internet Explorer, twitter, Microsoft, Windows 7.

Clubhouse Tags: Clubhouse, how-to, Windows 7, Security, IE, Internet Explorer (IE)

MSRC references: Security Advisory, Internet Explorer (IE), Workarounds, Defense-in-depth, Exploitability, Zero-Day Exploit

Delicious Bookmark this on Delicious Bookmark and Share

Also available via http://bit.ly/5TO6wk

Categories
Uncategorized

Security Advisory 979352 Posted: Vulnerability in Internet Explorer Could Allow Remote Code Execution

As noted in Mike Reavey’s posts on The Microsoft blog and The Microsoft Security Response Center (MSRC) blog today, we have just released Security Advisory 979352. Here’s the detail from Mike Reavey’s post

Based upon our investigations, we have determined that Internet Explorer was one of the vectors used in targeted and sophisticated attacks against Google and possibly other corporate networks. Today, Microsoft issued guidance to help customers mitigate a Remote Code Execution (RCE) vulnerability in Internet Explorer. Additionally, we are cooperating with Google and other companies, as well as authorities and other industry partners.

Microsoft remains committed to taking the appropriate action to help protect our customers. We released Security Advisory 979352 to provide customers with actionable guidance and tools to help with protections against exploit of this vulnerability. Microsoft has not seen widespread customer impact, rather only targeted and limited attacks exploiting IE 6 at this time. Our teams are currently working to develop an update and we will take appropriate action to protect customers when the update has met the quality bar for broad distribution. That may include releasing the update out of band.

It is important to note that complex attacks targeting specific corporate networks are becoming more prevalent in the threat landscape, therefore organizations should follow defense-in-depth best practices, and deploy multiple layers of protection to improve their security posture. In addition, Protected Mode in IE 7 on Windows Vista and later significantly reduces the ability of an attacker to impact data on a user’s machine. Customers should also enable Data Execution Prevention (DEP) which helps mitigate online attacks. DEP is enabled by default in IE 8 but must be manually enabled in prior versions.

Customers can also set Internet and Local intranet security zone settings to "High" to prompt before running ActiveX Controls and Active Scripting in these zones or configure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone. You can find details on implementing these settings in the advisory.

Anyone believed to have been affected can visit: http://www.microsoft.com/protect/support/default.mspx and should contact the national law enforcement agency in their country. Those in the United States can contact Customer Service and Support at no charge using the PC Safety hotline at 1-866-727-2338 (PCSAFETY). Additionally, customers in the United States should contact their local FBI office or report their situation at: www.ic3.gov. Customers should follow the guidance in the advisory and our Protect Your PC guidance of enabling a firewall, getting software updates, and installing antivirus software (learn more by visiting the Protect Your PC web site). International customers can find their Regional Customer Service Representative http://support.microsoft.com/common/international.aspx.

We are also working with our Microsoft Active Protections Program (MAPP), the Microsoft Security Response Alliance (MSRA), authorities and other industry partners to help provide broader protections for customers. Together with our partners, we will continue to monitor the threat landscape and will take action against any web sites that seek to exploit this vulnerability.

The Security Advisory will be updated with any new developments so if you are not already subscribed to our comprehensive alerts, please do so in order to be alerted by email when new information is added.

-Mike Reavey

This from our Security Advisories page on TechNet…

Microsoft Security Advisory (979352) – Vulnerability in Internet Explorer Could Allow Remote Code Execution, Published: January 14, 2010

Executive Summary

Microsoft is investigating a report of a publicly exploited vulnerability in Internet Explorer. This advisory contains information about which versions of Internet Explorer are vulnerable as well as workarounds and mitigations for this issue.

Our investigation so far has shown that Internet Explorer 5.01 Service Pack 4 on Microsoft Windows 2000 Service Pack 4 is not affected, and that Internet Explorer 6 Service Pack 1 on Microsoft Windows 2000 Service Pack 4, and Internet Explorer 6, Internet Explorer 7 and Internet Explorer 8 on supported editions of Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are affected.

The vulnerability exists as an invalid pointer reference within Internet Explorer. It is possible under certain conditions for the invalid pointer to be accessed after an object is deleted. In a specially-crafted attack, in attempting to access a freed object, Internet Explorer can be caused to allow remote code execution.

At this time, we are aware of limited, active attacks attempting to use this vulnerability against Internet Explorer 6. We have not seen attacks against other affected versions of Internet Explorer. We will continue to monitor the threat environment and update this advisory if this situation changes. On completion of this investigation, Microsoft will take the appropriate action to protect our customers, which may include providing a solution through our monthly security update release process, or an out-of-cycle security update, depending on customer needs.

We are actively working with partners in our Microsoft Active Protections Program (MAPP) and our Microsoft Security Response Alliance (MSRA) programs to provide information that they can use to provide broader protections to customers. In addition, we’re actively working with partners to monitor the threat landscape and take action against malicious sites that attempt to exploit this vulnerability.

Microsoft continues to encourage customers to follow the "Protect Your Computer" guidance of enabling a firewall, applying all software updates and installing anti-virus and anti-spyware software. Additional information can be found at Security at home.

Mitigating Factors:

  • Protected Mode in Internet Explorer on Windows Vista and later Windows operating systems limits the impact of the vulnerability.
  • In a Web-based attack scenario, an attacker could host a Web site that contains a Web page that is used to exploit this vulnerability. In addition, compromised Web sites and Web sites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker’s Web site.
  • An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less affected than users who operate with administrative user rights.
  • By default, Internet Explorer on Windows Server 2003 and Windows Server 2008 runs in a restricted mode that is known as Enhanced Security Configuration. This mode sets the security level for the Internet zone to High. This is a mitigating factor for Web sites that you have not added to the Internet Explorer Trusted sites zone.
  • By default, all supported versions of Microsoft Outlook, Microsoft Outlook Express, and Windows Mail open HTML e-mail messages in the Restricted sites zone. The Restricted sites zone helps mitigate attacks that could try to exploit this vulnerability by preventing Active Scripting and ActiveX controls from being used when reading HTML e-mail messages. However, if a user clicks a link in an e-mail message, the user could still be vulnerable to exploitation of this vulnerability through the Web-based attack scenario.

Tags: IE, Security, what I read, Internet Explorer, twitter, Microsoft, Windows 7.

Clubhouse Tags: Clubhouse, how-to, Windows 7, Security, IE, Internet Explorer (IE) 

MSRC references: Security Advisory, Internet Explorer (IE), Workarounds, Defense-in-depth, Exploitability, Zero-Day Exploit

Delicious Bookmark this on Delicious Bookmark and Share

Also available via http://bit.ly/4F3tgX

Categories
Uncategorized

How to organize like Bill Gates, the HP-Microsoft deal, Helping in Haiti and more

How Bill WorksYes, I’ve been neglecting my blog. Although I have a couple of blog posts in the works (on setting up our Windows 7 home network connected to our Media Center), I have been just too busy with (gasp!) real work. So I obviously need to be better at my organization: helpful that I found this brief article on Bill Gates’ organizational effort with a few of his "top tactics" with a nod of what Bill calls the digital workstyle. Missing from the article: you need a great staff! For me, here’s a quick post that answers one of the popular questions I often get: "How I Work at Microsoft". 

First off, I supported @Americares http://www.americares.org/ WRT Haiti earthquake victims as 99% of the goes to the relief effort. You can read more here about Microsoft’s help to relief organizations in Haiti and see a list of charities helping in the country here on MSN. (BTW, I’m an AT&T customer. With all of the press on teh incredible response via text message donations, there’s a bit of a brou-ha-ha WRT AT&T’s note that "Standard text messaging rates may apply" for said donations made on its network. I asked @ATTNews to waive fees like @Verizon & @TMobile for Haiti donations. And it seems that customer response and public pressure has caused AT&T to give in on that surcharge.)

Lots of news on the Microsoft & HP CEOs announcement yesterday on investment in IT infrastructure software, as initially noted here by CIO.com. You can read all about the HP – Microsoft three-year, $250 million deal to advance cloud computing for businesses on Microsoft Presspass and this post from Brad Anderson of the mgmt & services division.

Now, on to a couple of noteworthy bits from my posts on Twitter and on Twitter and from friendfeed:

 

As noted Microsoft is supporting relief efforts in Haiti + how you can help, MSFT makes initial $1.25 million commitment [Blog] http://bit.ly/8KRBTb

WSJTech reports that PC Shipments Surge in Holiday Quarter http://on.wsj.com/7RfTy3

Sad that Bill Veghte over in Windows Marketing is leaving the company after nearly two decades per @inafried http://news.cnet.com/8301-13…

Sad to read about Apple IMac quality issues (Yellow Discoloration, Fail to Boot) http://www.dailytech.com/An+Appl…

@maryjofoley reports that Visual Studio 2010 gets a new launch date: April 12, 2010: http://blogs.zdnet.com/microso…

@LanceUlanoff reports on Google in China: Pulling Out May Not Be a Good Idea http://www.pcmag.com/article… China’s wrong, but will Google’s exit help anyone? #google #china

@karaswisher: The One-Year Report Card of Yahoo’s Carol Bartz–Management: A- http://kara.allthingsd.com/2010011…

@meridith: The CIO Job Market in 2010: More Opportunities and More Competition http://www.cio.com/article… #CIO #jobs

Run into error code 0x80070005, Windows 7 "is not Genuine"? Disable policy settings or edit permissions: http://support.microsoft.com/kb2008385

A look inside BMW’s Windows 7 rollout to date: "Smooth Driving So Far" on CIO.com http://www.cio.com/article…

Nice too see Michigan and Microsoft teaming up to offer free technology training around the state http://www.bing.com/news… #fb

Microsoft reiterates console generation stance: "Xbox 360 is designed to last longer than normal" http://www.totalvideogames.com/Xbox-36…

Other vendors to follow Apple offering multi-touch tablet PCs in Q1 or Q2, say Taiwan touch panel makers http://www.digitimes.com/print…

From JohnPaczkowski: Google VP of Engineering Andy Rubin: We’re Building a Nexus One for Enterprise http://digitaldaily.allthingsd.com/2010010…

From LanceUlanoff: Why Tablets Need Apple http://www.pcmag.com/article… Everybody’s making tablets, but nobody knows what they’re for. @SaschaSegan is right.

@toddbishop: Miguel de Icaza, Microsoft MVP? Yep, it’s true. http://www.techflash.com/seattle…

From Stephen Rose: RT @MaxTrinidad: RT @MSSpringboard: Four Free Tools that every Administrator should Know About http://technet.microsoft.com/en-us…

@MSFT_IT: The definitive explainer of Virtual Desktop Infrastructure (VDI), by Microsoft IT Evangelist Yung Chou http://blogs.technet.com/windows…

@MSFT_IT: MSFT CIO Tony Scott talks about new directions for IT in 2010. Video and paper available at microsoft.com/everybodysbusiness

@Cisco_Mobile Gotcha – sometimes that download get’s missed. Thx for the info

Troubleshooting Windows 7 with Microsoft’s Built-In Tools: It all began w/ Firefox 3.5, via @tomshardware http://www.tomshardware.com/reviews…

Microsoft Security Advisory 979267: Adobe Flash Player 6 Vulnerability in Windows XP could allow remote code execution http://www.microsoft.com/technet…

Skip Microsoft’s Critical Patch, Focus on Adobe’s, Experts Urge reports @gkeizer via @PCWorld http://www.pcworld.com/article…

Microsoft will report earnings after the market close on Thurs, January 28. Investor Relations page: http://www.microsoft.com/msft…

@edbott: New at ZDNet: Move over, God mode! 94 more secret shortcuts for Windows 7: http://blogs.zdnet.com/Bott…

@msPartner: PartnerNews: What are Microsoft and HP announcing tomorrow? http://www.microsoftpartnernetwork.com/News… What will Ballmer and Hurd unveil? #MPN

@johnhcook: Comcast’s new Data Meter: Like a calorie counter for Internet usage http://www.techflash.com/seattle…

 

Tags: Microsoft, articles, blogs, what I read, Twitter.

Clubhouse Tags: Clubhouse, Windows Vista, Windows 7, computers, how-to

Delicious Bookmark this on Delicious Bookmark and Share

Also available via

Categories
Uncategorized

What’s that over the Bellevue skyline, the Bat-signal? No, the Bing-signal

Have you seen what’s new over the Bellevue, WA skyline? My son, Max, noticed a sight of one of the local Microsoft buildings this evening coming home from the new movie, Avatar:

bing1209-sm

Here’s a detail from the mobile phone shot, with a view of the "bing":

bing1209-lg

Tags: Microsoft, Bing, Search, Clubhouse, Bing, Search, Windows Live

Bookmark and Share

Also available via http://bit.ly/7CZM2Z

Categories
Uncategorized

A bit about BitLocker today on the Windows Team Blog

Picture of BitLockerIf there is data on your PC that you need to protect, BitLocker encryption can help to protect your files with encryption. (As noted on the Windows 7 site, BitLocker "helps keep everything from documents to passwords safer by encrypting the entire drive that Windows and your data reside on. Once BitLocker is turned on, any file you save on that drive is encrypted automatically.")

Last week I read several articles in the news – like this one on arstechnica – about commercial tools that claim to crack BitLocker and take advantage of weaknesses. Of interest today is Paul Cooke’s post over on the Windows Team Blog on Windows BitLocker Claims and that to say these tools break BitLocker "is a bit of a misnomer"…

"Windows 7 is seeing success in the marketplace which I am very happy about from a security perspective. The Microsoft Security Intelligence Report has shown us again and again that the more up-to-date a PC is, the less likely it is to be infected by malware and other potentially dangerous software. So Windows 7 making strides is helpful to the ecosystem overall from a security standpoint. Success comes at a price though, through greater scrutiny and misinterpretation of some of the technologies. One of those technologies is BitLocker.

"Our customers are confronted with a wide spectrum of data security threats that are specific to their environment and we work hard to provide capabilities and information to help the customer achieve the right balance of security, manageability, and ease-of-use for their specific circumstances. BitLocker is an effective solution to help safeguard personal and private data on mobile PCs and provides a number of protection options that meet different end-user needs.  Like most full volume encryption products on the market, BitLocker uses a key-in memory when the system is running in order to encrypt/decrypt data on the fly for the drives in use.  Also like other encryption products, a determined adversary has significant advantages when they have physical access to a computer.

"We recognize users want advice with regards to BitLocker and have published best practice guidance in The Data Encryption Toolkit for Mobile PCs. In the toolkit, we discuss the balance of security and usability and detail that the most secure method to use BitLocker in hibernate mode and a TPM+PIN configuration. Using this method, a machine that is powered off or hibernated will protect users from the ability to extract a physical memory image of the computer.

"Windows 7 BitLocker continues to be a foundational component adding to any defense in depth strategy for securing systems, and specifically laptops.  Even with the great enhancements made in Windows 7 such as BitLocker To Go, it still remains that BitLocker alone is not a complete security solution.  IT professionals as well as users must be diligent when protecting IT resources and the best protection against these sorts of targeted attacks requires more than just technology: it requires end user education and physical security also play important roles."

As Ars pointed out in an updated post…

"… this isn’t exactly a "crack" for BitLocker. Like most similar digital forensics analysis software, Passware Kit Forensic requires access to a physical memory image file of the target computer before it can extract all the encryption keys for a BitLocker disk. If a forensics analyst or thief has physical access to a running system, it is possible to take advantage of the fact that the contents are in the computer’s memory. Other drive encryption programs have similar issues."

Learn more about BitLocker…

 

Tags: Windows Vista, Security, what I read, twitter, Microsoft, Windows 7, BitLocker.

Clubhouse Tags: Clubhouse, how-to, Windows 7, Security, BitLocker.

Delicious Bookmark this on Delicious Bookmark and Share

Also available via