Menu
Microsoft patches 10 bugs in Windows, IE and Bluetooth

Microsoft patches 10 bugs in Windows, IE and Bluetooth

'No user interaction required' to hack Windows' Bluetooth, says analyst

Microsoft Tuesday patched 10 vulnerabilities, four marked "critical," in Windows and Internet Explorer (IE), and disabled a little-known third-party ActiveX control bundled with Logitech hardware, including keyboards and mice.

The 10 fixes are delivered in seven separate security updates, three of which were considered critical, the highest threat ranking in Microsoft's four-step scoring system.

The one that caught the eyes of most analysts was MS09-030, a critical update that patches a single bug in Windows' implementation of Bluetooth. "This is the most interesting of the bunch," said Tyler Reguly, a security research engineer with nCircle Network Security. "We haven't seen Microsoft patching Bluetooth before for one thing."

Eric Schultze, chief technology officer of Shavlik Technologies, echoed Reguly, saying that he couldn't remember Microsoft ever addressing Bluetooth, either. "This sounds like it's pretty bad," said Schultze, "but the bulletin is unclear and doesn't tell you whether Bluetooth is enabled by default on Windows XP." If it's not, he added, the danger would be reduced.

An attacker could exploit the flaw by flooding the receiving system -- a laptop in a public place, for example -- with a large number of malformed SDPs (Service Discovery Protocols). No user interaction is required, meaning that an attack could be mounted without the user knowing.

A Symantec researcher also tagged the Bluetooth bug as the most notable of the month. "The vulnerability is especially noteworthy because it allows an attacker in range of a Bluetooth-enabled device running Windows XP or Vista to take control of that device," said Ben Greenbaum, a Symantec senior research manager, in an e-mail Tuesday.

The other two critical updates are run-of-the-mill client-side bugs, said Reguly, the kind Windows users have come to expect to see each month. "The DirectX and Internet Explorer, are standard client-side stuff," Reguly said. "Both would use the Web as an attack vector, and well, IE, we almost always see patches for IE."

Schultze agreed. "Standard IE," he said. "It's not even fun to talk about these any more."

MS08-031 patches a pair of vulnerabilities in IE, one of which Microsoft pegged as critical, while the other it judged as "important," its second-highest rating. The bugs affect all currently-supported versions of the browser, including IE7 on the newest updates to both Windows XP and Windows Vista, SP3 (Service Pack 3) and SP1, respectively.

Both can be exploited by tempting users to a malicious Web site, said Microsoft.

MS08-033, also marked as critical, fixes a pair of serious flaws in DirectX, Windows' library of multimedia APIs (application programming interfaces). Attackers could exploit the bugs by feeding malicious files to users or possibly getting them to steer to a site that hosted malformed multimedia content streams.

Schultze wasn't sure whether an exploit would require help from the user. "The bulletin just isn't clear," he said. He also pointed out both bugs involve flaws in the "quartz.dll," a file instrumental to DirectShow, one of DirectX's APIs. "Quartz.dll has had numerous problems in the past," said Schultze. "At least three in the last three years." Computerworld, however, was able to find just two Microsoft bulletins -- MS07-064 from last year and MS05-050 from 2005 -- that finger quartz.dll.


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Featured

Slideshows

The making of an MSSP: a blueprint for growth in NZ

The making of an MSSP: a blueprint for growth in NZ

Partners are actively building out security practices and services to match, yet remain challenged by a lack of guidance in the market. This exclusive Reseller News Roundtable - in association with Sophos - assessed the making of an MSSP, outlining the blueprint for growth and how partners can differentiate in New Zealand.

The making of an MSSP: a blueprint for growth in NZ
Reseller News Platinum Club celebrates leading partners in 2018

Reseller News Platinum Club celebrates leading partners in 2018

The leading players of the New Zealand channel came together to celebrate a year of achievement at the inaugural Reseller News Platinum Club lunch in Auckland. Following the Reseller News Innovation Awards, Platinum Club provides a platform to showcase the top performing partners and start-ups of the past 12 months, with more than ​​50 organisations in the spotlight.​​​

Reseller News Platinum Club celebrates leading partners in 2018
Meet the top performing HP partners in NZ

Meet the top performing HP partners in NZ

HP has honoured its leading partners in New Zealand during 2018, following 12 months of growth through the local channel. Unveiled during the fourth running of the ceremony in Auckland, the awards recognise and celebrate excellence, growth, consistency and engagement of standout Kiwi partners.

Meet the top performing HP partners in NZ
Show Comments