Microsoft looking into new SMB vulnerability report

Share this article:

A researcher this week published proof-of-concept code that allows an attacker to exploit a vulnerability in Windows 7 and Server 2008 Release 2 to crash systems.

The flaw, detailed by Laurent Gaffie in a blog post on Wednesday, lies in the Windows Server Message Block (SMB) and requires no user interaction to exploit.

Attackers can remotely crash systems if a victim machine receives malformed packets, Jonathan Leopando, a member of the Trend Micro technical communications team, said in a blog post Thursday.

"What ever your firewall is set to, you can get remotely smashed via IE (Internet Explorer) or even via some NBNS (NetBios Name Service) tricks," Gaffie said.

Christopher Budd, security response communications lead at Microsoft, told SCMagazineUS.com in a statement Friday that the software giant is aware of the purported vulnerability, which is said to cause a denial-of-service attack.

"We're currently unaware of any attacks trying to use the claimed vulnerability or of customer impact," Budd said. "Once we're done investigating, we will take appropriate action to help protect customers."

Users are encouraged to block ports used by the SMB protocol until Microsoft offers workarounds or permanent fix,  Leopando said.

In October, Microsoft patched another serious vulnerability in the SMB protocol that Gaffie discovered.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

ISSA tackles workforce gap with career lifecycle program

ISSA tackles workforce gap with career lifecycle program ...

On Thursday, the group launched its Cybersecurity Career Lifecycle (CSCL) program.

Amplification DDoS attacks most popular, according to Symantec

Amplification DDoS attacks most popular, according to Symantec

The company noted in a whitepaper released on Tuesday that Domain Name Server amplification attacks have increased 183 percent between January and August.

Court shutters NY co. selling security software with "no value"

A federal court shut down Pairsys at the request of the Federal Trade Commission.