Microsoft Releases Emergency Windows Patch

With attackers finding more ways to exploit a new Windows problem, Microsoft today published an emergency software patch, fixing a critical flaw in its operating system.

The update, released as expected today, actually fixes seven separate Windows vulnerabilities, but security experts are most concerned about a bug in the way Windows processes .ani Animated Cursor files. Online criminals have been exploiting this bug since late last week.

This, however, is the only one of the seven vulnerabilities rated "critical" by Microsoft.


Microsoft was forced to release the early update a week ahead of schedule because attacks had simply become too widespread, said Ken Dunham, director of malicious code intelligence with iDefense. "We have over 400 different URLs identified and related to attacks, and multiple e-mails have been sent out that direct people back there," he said. "We have proof that organized groups are now launching attacks."

Dunham added that the .ani attack vector will probably be one of the "most prevalent and persistant types of attacks we will see in the next months and years."

Exploit code for the flaw has now been added to the widely used Metasploit hacking tool, and there are automated malicious Web site generation tools available he added.

Other Emergency Patches

This is the third such "out-of-band" patch release Microsoft has made since January 2006. While attacks based on this .ani flaw are still considered "limited," exploitation of the bug is following trends "similar" to the WMF (Windows Metafile) and VML (Vector Markup Language) vulnerabilities that were patched in the other two updates, according to Mark Miller, director of Microsoft's Security Response Center.

Microsoft has seen only Web-based exploitation of the .ani flaw, Miller said. "There have been some indications that e-mail has been used, but we haven't seen anything on that front."

Microsoft was first notified of this flaw in December 2006 by security vendor Determina.

A Determina executive said today that Microsoft would have been better off issuing a patch for the .ani flaw sooner, rather than waiting for the April update and forcing customers to rush an emergency fix. "The customers are now going to incur the same cost as they would before, except that they are going to have to do this in panic," said Nand Mulchandani, Determina's vice president of marketing. "I have no idea why they didn't do this earlier."

Miller defended Microsoft's decision, saying that because the .ani flaw could affect other applications it required a great deal of testing. "The amount of time taken to patch was appropriate given the level of quality we were trying to release with," he said.

Windows users are strongly encouraged to install the patch, because the .ani flaw can be used to exploit computers running virtually any version of Windows, including Vista, even if they are running non-Microsoft browsers like Firefox and Opera, Mulchandani said.

Shop ▾
arrow up Amazon Shop buttons are programmatically attached to all reviews, regardless of products' final review scores. Our parent company, IDG, receives advertisement revenue for shopping activity generated by the links. Because the buttons are attached programmatically, they should not be interpreted as editorial endorsements.

Subscribe to the Security Watch Newsletter