Menu
New Windows privilege escalation flaw exploited in active attacks

New Windows privilege escalation flaw exploited in active attacks

A vulnerability in Windows XP and Windows Server 2003 is exploited with a flaw in Adobe Reader in a new attack, researchers at FireEye said

Attackers are exploiting a new and unpatched vulnerability in Windows XP and Windows Server 2003 that allows them to execute code with higher privileges than they have access to.

The vulnerability is located in NDProxy.sys, "a system-provided driver that interfaces WAN miniport drivers, call managers, and miniport call managers to the Telephony Application Programming Interfaces (TAPI) services."

"An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode," Microsoft said in a security advisory published Wednesday. "An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights."

This is an elevation-of-privilege (EoP) vulnerability, not a remote code execution one, which means that attackers need to already have access to a low-privileged account on the targeted system in order to exploit it.

According to Microsoft, this vulnerability is already being exploited in "limited, targeted attacks," but doesn't affect Windows versions newer than Windows XP and Windows Server 2003.

The company provided a temporary workaround that involves disabling NDProxy.sys, but this will cause certain services which depend on TAPI, like Remote Access Service (RAS), dial-up networking and virtual private networking (VPN), to no longer work.

Microsoft credited security vendor FireEye with helping the company investigate the new vulnerability, which is being tracked as CVE-2013-5065.

This EoP vulnerability is being exploited in attacks in conjunction with a remote code execution vulnerability in older versions of Adobe Reader that was patched in May, FireEye security researchers Xiaobo Chen and Dan Caselden said Wednesday in a blog post. The exploit targets computers running Adobe Reader on Windows XP with Service Pack 3, but users who have the latest versions of Adobe Reader installed should be protected, they said.

According to the FireEye researchers, if the exploit is successful, an executable file is dropped in the Windows temporary directory and is executed.

However, FireEye did not immediately respond to an inquiry seeking more information about how the exploit is being distributed, whether there are any specific targets, or the nature of the rogue file executed on vulnerable computers.


Follow Us

Join the newsletter!

Error: Please check your email address.

Tags securityMicrosoftmalwareadobeintrusionFireEyeExploits / vulnerabilities

Featured

Slideshows

Looking back at the top 15 M&A deals in NZ during 2017

Looking back at the top 15 M&A deals in NZ during 2017

In 2017, merger and acquisitions fever reached new heights in New Zealand, with a host of big name deals dominating the headlines. Reseller News recaps the most important transactions of the Kiwi channel during the past 12 months.

Looking back at the top 15 M&A deals in NZ during 2017
Kiwi channel closes 2017 with After Hours

Kiwi channel closes 2017 with After Hours

The channel in New Zealand came together to celebrate the close of 2017, as the final After Hours played out in front of a bumper Auckland crowd.

Kiwi channel closes 2017 with After Hours
Meet the top performing HP partners in NZ

Meet the top performing HP partners in NZ

HP honoured leading partners across the channel at the Partner Awards 2017 in New Zealand, recognising excellence across the entire print and personal systems portfolio.

Meet the top performing HP partners in NZ
Show Comments