Microsoft patch 'leaves users vulnerable'

One of the patches Microsoft issued last week is nothing of the sort, according to a researcher who Monday accused Microsoft of making functionality a higher priority than security.

Share

One of the patches Microsoft issued last week is nothing of the sort, according to a researcher who Monday accused Microsoft of making functionality a higher priority than security.

According to Tyler Reguly, a senior security engineer with nCircle Security, last Tuesday's MS09-008 update does not fix the problem for all users, many of whom may not realise that they're still vulnerable to attack.

"When you get a patch from a vendor, you expect it to provide some level of security," said Reguly. "But MS09-008 only mitigates the problem, it doesn't patch it."

MS09-008, one of three security updates released 10 March, addressed four separate flaws in Windows' DNS and WNS servers, and required that network administrators patch all currently-supported server editions of Windows, including Windows 2000 Server, Server 2003 and Server 2008.

Reguly has taken exception with the part of the update that addresses a vulnerability in the WPAD (Web Proxy Auto-Discovery) functionality of Windows DNS Server.

"WPAD is a way to automatically configure proxy servers on machines," he explained.

"When the browser, like Internet Explorer, is configured to 'Automatically Detect Settings,' it will look for wpad.company.com and attempt to resolve and pull down a configuration file. But if an attacker can manipulate the WPAD entry, all the traffic from those machines will go through his server. That would let him run 'man-in-the-middle' attacks to steal passwords or any other information."

Reguly said that while Microsoft provided a way to mitigate such attacks - the MS09-008 update lets administrators set up a "block list" of domain names that the DNS server will not resolve - it didn't actually fix the underlying problem.

Worse, the update doesn't even execute on servers that already sport WPAD entries. "If you have a valid [WPAD] entry, it's not patched," said Reguly.

Nor does Microsoft tell administrators that when they run the update. "People will assume that they're protected when they're not," he said.

"Ideally, Microsoft should have added an error message that when installing the update on a system with a WPAD entry that the mitigation hadn't been applied."

"Recommended For You"

Microsoft patch fixes 18 critical bugs Microsoft fixes biggest ever patch release