Exploits of unpatched Windows bug will jump, says Symantec

DirectShow zero-day now target of attack toolkit

An exploit of a still-unpatched vulnerability in Microsoft Windows XP and Server 2003 has been added to a multi-strike attack toolkit, Symantec said late last week, a move that may mean attacks will increase soon.

According to Symantec, an in-the-wild exploit of the DirectShow bug, which Microsoft acknowledged a month ago, has been added to at least one Web-based attack kit. "This will likely lead to wide-spread use in a short time," said Liam Murchu, a researcher with Symantec's security response group, in an entry posted to the company's blog on Friday.

Microsoft has not yet issued a fix for the DirectShow bug, which affects Windows 2000, XP and Server 2003, but not the newer Windows Vista or Server 2008. The flaw also doesn't affect the not-yet-released Windows 7.

However, attacks leveraging the bug have been tracked since May, when Microsoft issued a security advisory and confirmed it had evidence of "limited, active attacks."

Unlike other recent exploits of Microsoft zero-days -- vulnerabilities that haven't been patched by the time attack code surfaces -- the DirectShow attacks are not targeting specific individuals or organizations. "This is not a targeted attack, but is one of limited distribution," Ben Greenbaum, a senior research manager with Symantec, said in a telephone interview.

What caught researchers' attention, added Greenbaum, was that the DirectShow exploit piggybacked on a run-of-the-mill phishing attack. It's becoming more common, said Greenbaum, that a phishing site -- in this case a bogus log-in page for Microsoft's Windows Live software -- also hosts malware that tries to hijack PCs.

"They're thinking: 'Why not try to get them with everything we can?'" said Greenbaum, referring to the attackers.

The phishing site silently redirects visitors to another URL that hosts the DirectShow attack code, which is in the form of a malicious .avi file. Multiple malformed .dll files are also loaded onto the victimized system; those .dlls, in turn, load an encoded .exe payload that then downloads and installs a Trojan horse that adds the compromised PC to a growing botnet.

Although a patch is not yet available, Microsoft has suggested that users disable QuickTime parsing on Windows 2000, XP and Server 2003 machines. QuickTime, which is Apple's media player, is not flawed, but the QuickTime parser in DirectShow, a component of DirectX, is. Microsoft has posted a tool that automates the process of disabling QuickTime parsing in Windows; normally that requires editing the Windows registry, a chore many users avoid.

Microsoft's next regularly-scheduled security updates will be released July 14. Most researches expect the company to patch the DirectShow bug then.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags Windowssymantecbugs

More about AppleMicrosoftSymantecWindows Live

Show Comments
[]