Homeland Security: Apply MS06-040 Patch

In an unusual move, the Department of Homeland Security releases a firm notice to Windows users: Pay special attention to a gaping worm hole in Windows. Proof-of-concept exploits have already been created.

Less than 24 hours after Microsoft shipped a dozen bulletins with security fixes for 23 serious software vulnerabilities, the U.S. governments Department of Homeland Security issued a firm notice to Windows users: immediately apply the patches in the MS06-040 bulletin.

In a somewhat unusual move, the DHS warned that the patches cover a remote code execution vulnerability that could be used in a network worm attack similar to Blaster, Slammer of Sasser.

"Windows users are encouraged to avoid delay in applying this security patch. Attempts to exploit vulnerabilities in operating systems routinely occur within 24 hours of the release of a security patch," the agency said in an public advisory.

The department warned that a successful attack could be launched remotely to take control of an affected system and install programs, view, change or delete data, and create new accounts with full user rights.

/zimages/4/28571.gifRead more here about Microsofts efforts to patch a vulnerability.

"This vulnerability could impact government systems, private industry and critical infrastructure, as well as individual and home users," the DHS added.

The DHS recommended that home users opt for Microsofts Windows Update to automatically download and apply all the appropriate security fixes.

The MS06-040 bulletin addresses a buffer overflow in Server Service, which is used to provide RPC (remote procedure call) support, file print support and named pipe sharing over a network.

Because the flaw presents a remote, unauthenticated attack vector, an anonymous attacker could send specially rigged network packets over the Internet to launch malicious code on vulnerable systems.

/zimages/4/28571.gifTo read more about the Sasser worm, click here.

A worm attack exploiting this bug would affect unpatched versions of Windows 2000, Windows XP (SP1 and SP2) and Windows Server 2003 (SP1 inclusive).

The use of the built-in Internet Connection Firewall in Windows XP and Windows Server 2003 would help block network-based attempts to exploit the vulnerability.

Microsoft also recommends that TCP ports 139 and 445 be blocked at the firewall.

The US-CERT (U.S. Computer Emergency Readiness Team) has already warned that the flaw has been used in active attacks, even before Microsoft released the patch.

Immunity, a Miami-based security company that sells penetrating testing tools, on Aug. 9 released proof-of-concept exploits for MS06-040 to customers in its Partner Program.

/zimages/4/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.