Vulnerability-MS06-040, one among the 23 security holes patched by Microsoft in its latest security bulletin on August 8, is highly critical and poses a direct and dire threat to computers on the Windows platform, the analysts add. A patch for this vulnerability is available at MS06-040 () on the Microsoft Web site.
While some of the exploits aimed at the flaw are already available on the Web, and can be used by malware authors, MicroWorld says that a backdoor variant named 'Win32.IRCBot.st' can attack the vulnerability in order to spread through networks.
'Win32.IRCBot.st' is a PE executable that is packed with MEW. It appears as 'wgareg.exe' in the Windows System folder with a description 'Windows Genuine Advantage Registration Service'. The backdoor changes the security settings of the computer, turns off firewall and connects to the remote attacker via IRC channels.
While its first spreading routine is via the AOL Messenger, the second one uses MS06-040 vulnerability to infect remote computers. A hacker can scan for vulnerable IPS as the backdoor sends out the exploit and infect the targeted machine.
This is just one of the exploits aimed at the vulnerability in question, which can be a curtain-raiser for more attacks in days to come, says Arti Taru, assistant manager, R&D, MicroWorld Technologies. An exploit code pushed through Metasploit Framework can pave way for large scale Denial of Service attacks against unpatched computers. We strongly recommend users to update their Windows versions to prevent any further assaults through this security hole.
The gravity of the situation can be estimated from the fact that the Department of Homeland Security of the US government has issued an unusual warning on this issue, which says: Windows users are encouraged to avoid delay in applying this security patch. Attempts to exploit vulnerabilities in operating systems routinely occur within 24 hours of the release of a security patch."
|