Menu
Maliciously crafted files can disable Microsoft's antimalware products

Maliciously crafted files can disable Microsoft's antimalware products

A vulnerability in the engine used by many Microsoft antimalware products can lead to a persistent denial-of-service condition

A vulnerability allows attackers to disable Microsoft's antimalware products by sending specifically crafted files to users via websites, email or instant messaging applications.

The vulnerability is located in the Microsoft Malware Protection Engine, which sits at the core of many Microsoft security products for desktops and servers including Microsoft Forefront Client Security, Microsoft System Center 2012 Endpoint Protection, the Microsoft Malicious Software Removal Tool, Microsoft Security Essentials, Windows Intune Endpoint Protection and Windows Defender, which comes pre-installed in Windows Vista and later.

Microsoft fixed the vulnerability in Microsoft Malware Protection Engine 1.1.10701.0 released Tuesday. For home users, the new version should typically download and install automatically within 48 hours, but administrators in enterprise environments should make sure that their update management software is configured to approve the engine updates.

If left unpatched, the vulnerability can be exploited to force the Microsoft Malware Protection Engine into a scan timeout, essentially leading to a denial-of-service vulnerability. When this happens, the antimalware product will stop monitoring the system for threats until the rogue file is removed and the malware protection service is restarted.

"There are many ways that an attacker could place a specially crafted file in a location that is scanned by the Microsoft Malware Protection Engine," Microsoft said in a security advisory published Tuesday. "For example, an attacker could use a website to deliver a specially crafted file to the victim's system that is scanned when the website is viewed by the user. An attacker could also deliver a specially crafted file via an email message or in an Instant Messenger message that is scanned when the file is opened."

In addition, if the Malware Protection Engine runs on a Windows server hosting a website that accepts user-supplied content, an attacker could exploit the vulnerability by uploading a specially crafted file through the website.

Microsoft credited Tavis Ormandy, an information security engineer at Google, with discovering and reporting the vulnerability to the company.

Ormandy has found vulnerabilities in antimalware software in the past. In 2012 he found critical vulnerabilities in Sophos Antivirus.

Specific details about how to create the rogue files that prevent the Microsoft Malware Protection Engine from functioning properly were not released, but Ormandy hinted on Twitter that the problem involves JavaScript.

"This was an interesting bug in the JavaScript interpreter in Windows Defender," he said. "Yes, it has a JS interpreter."


Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags patchesGoogleMicrosoftsecurityDesktop securitypatch managementExploits / vulnerabilitiesmalwareantivirussophos

Featured

Slideshows

Sizing up the NZ security spectrum - Where's the channel sweet spot?

Sizing up the NZ security spectrum - Where's the channel sweet spot?

From new extortion schemes, outside threats and rising cyber attacks, the art of securing the enterprise has seldom been so complex or challenging. With distance no longer a viable defence, Kiwi businesses are fighting to stay ahead of the security curve. In total, 28 per cent of local businesses faced a cyber attack last year, with the number in New Zealand set to rise in 2017. Yet amidst the sensationalism, media headlines and ongoing high profile breaches, confusion floods the channel, as partners seek strategic methods to combat rising sophistication from attackers. In sizing up the security spectrum, this Reseller News roundtable - in association with F5 Networks, Kaspersky Lab, Tech Data, Sophos and SonicWall - assessed where the channel sweet spot is within the New Zealand channel. Photos by Maria Stefina.

Sizing up the NZ security spectrum - Where's the channel sweet spot?
Kiwi channel comes together for another round of After Hours

Kiwi channel comes together for another round of After Hours

The channel came together for another round of After Hours, with a bumper crowd of distributors, vendors and partners descending on The Jefferson in Auckland. Photos by Maria Stefina.​

Kiwi channel comes together for another round of After Hours
Consegna comes to town with AWS cloud offerings launch in Auckland

Consegna comes to town with AWS cloud offerings launch in Auckland

Emerging start-up Consegna has officially launched its cloud offerings in the New Zealand market, through a kick-off event held at Seafarers Building in Auckland.​ Founded in June 2016, the Auckland-based business is backed by AWS and supported by a global team of cloud specialists, leveraging global managed services partnerships with Rackspace locally.

Consegna comes to town with AWS cloud offerings launch in Auckland
Show Comments