Microsoft patches 10 bugs in Windows, IE and Bluetooth

'No user interaction required' to hack Windows' Bluetooth, says analyst

Microsoft Tuesday patched 10 vulnerabilities, four marked "critical," in Windows and Internet Explorer (IE), and disabled a little-known third-party ActiveX control bundled with Logitech hardware, including keyboards and mice.

The 10 fixes are delivered in seven separate security updates, three of which were considered critical, the highest threat ranking in Microsoft's four-step scoring system.

The one that caught the eyes of most analysts was MS09-030, a critical update that patches a single bug in Windows' implementation of Bluetooth. "This is the most interesting of the bunch," said Tyler Reguly, a security research engineer with nCircle Network Security. "We haven't seen Microsoft patching Bluetooth before for one thing."

Eric Schultze, chief technology officer of Shavlik Technologies, echoed Reguly, saying that he couldn't remember Microsoft ever addressing Bluetooth, either. "This sounds like it's pretty bad," said Schultze, "but the bulletin is unclear and doesn't tell you whether Bluetooth is enabled by default on Windows XP." If it's not, he added, the danger would be reduced.

An attacker could exploit the flaw by flooding the receiving system -- a laptop in a public place, for example -- with a large number of malformed SDPs (Service Discovery Protocols). No user interaction is required, meaning that an attack could be mounted without the user knowing.

A Symantec researcher also tagged the Bluetooth bug as the most notable of the month. "The vulnerability is especially noteworthy because it allows an attacker in range of a Bluetooth-enabled device running Windows XP or Vista to take control of that device," said Ben Greenbaum, a Symantec senior research manager, in an e-mail Tuesday.

The other two critical updates are run-of-the-mill client-side bugs, said Reguly, the kind Windows users have come to expect to see each month. "The DirectX and Internet Explorer, are standard client-side stuff," Reguly said. "Both would use the Web as an attack vector, and well, IE, we almost always see patches for IE."

Schultze agreed. "Standard IE," he said. "It's not even fun to talk about these any more."

MS08-031 patches a pair of vulnerabilities in IE, one of which Microsoft pegged as critical, while the other it judged as "important," its second-highest rating. The bugs affect all currently-supported versions of the browser, including IE7 on the newest updates to both Windows XP and Windows Vista, SP3 (Service Pack 3) and SP1, respectively.

Both can be exploited by tempting users to a malicious Web site, said Microsoft.

MS08-033, also marked as critical, fixes a pair of serious flaws in DirectX, Windows' library of multimedia APIs (application programming interfaces). Attackers could exploit the bugs by feeding malicious files to users or possibly getting them to steer to a site that hosted malformed multimedia content streams.

Schultze wasn't sure whether an exploit would require help from the user. "The bulletin just isn't clear," he said. He also pointed out both bugs involve flaws in the "quartz.dll," a file instrumental to DirectShow, one of DirectX's APIs. "Quartz.dll has had numerous problems in the past," said Schultze. "At least three in the last three years." Computerworld, however, was able to find just two Microsoft bulletins -- MS07-064 from last year and MS05-050 from 2005 -- that finger quartz.dll.

More about AppleLogitechMicrosoftnCirclenCircle Network SecurityShavlikShavlik TechnologiesSymantecVIAYahoo

Comments

Comments are now closed

NBN: Is your suburb getting FTTN?

READ THIS ARTICLE
DO NOT SHOW THIS BOX AGAIN [ x ]