Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity
    • IT Management

    Microsoft Has Google to Thank for Finding Major Zero-Day Vulnerability

    Written by

    Wayne Rash
    Published May 11, 2017
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Microsoft has Google to thank for revealing a new vulnerability in current versions of Windows, SharePoint and the company’s stand-alone security software—a vulnerability so serious that Microsoft rushed through a fix that’s already being sent out as an update to Windows.

      The vulnerability, which was found by staffers Natalie Silvanovich and Tavis Ormandy of Google Project Zero, works by having the Microsoft security software actually execute the malware while scanning. The exploit can be delivered in an email or an instant message, and because it’s executed by the security scan, it would not even need to be opened.

      Microsoft has already released a fix to the vulnerability in the automatic updates for its security software. Automatic updating for security works for individual and for enterprise implementations of Windows and other affected products. Because of this, the company isn’t recommending any action.

      “The update addresses a vulnerability that could allow remote code execution if the Microsoft Malware Protection Engine scans a specially crafted file,” Microsoft said in the technical note announcing the fix. “An attacker who successfully exploited this vulnerability could execute arbitrary code in the security context of the LocalSystem account and take control of the system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.”

      The Microsoft security advisory provides a list of affected Microsoft products, which include all current versions of Windows 7, 8.1 and 10.

      The exploit can be launched when the Malware Protection Engine automatically scans files with Real-time Protection turned on; if that protection is turned off, then the scan happens later when all files are scanned.

      Even though Microsoft isn’t recommending any action from users, that doesn’t mean they have nothing to do to confirm their safety. Any computer that isn’t able to receive automatic security updates from Microsoft may still be vulnerable, for example. Such situations could include where security software or hardware prevents the updates from getting through, as well as any machines that are turned off at the time the update was released and aren’t turned on right away.

      It’s also important to confirm that the security update actually happened. The instructions for verifying that the update took place are included in Microsoft’s Malware Protection Engine deployment instructions. Basically, when using an affected product, check the Help and About screens for information on the update. Check the specific instructions for details on your version of Windows or other Microsoft products.

      Even if users or organizations have third-party anti-malware products installed, they should still allow the update to run. While you may have something else doing the heavy lifting, it’s very likely that the Malware Protection Engine is still installed and operating at some level of your computers. The fact that it’s there and can still scan the malware means your system may still be vulnerable.

      It’s worth noting that the security researchers who found this potential exploit said it’s “wormable,” meaning that it could be implemented as a self-replicating, self-spreading network worm and affect systems that don’t directly receive files from the internet.

      The good news is that once alerted, Microsoft put forth great effort to fix the vulnerability quickly. The Google team found the vulnerability on May 6, and the fix was sent out three days later. This fast turnaround is remarkable.

      What’s also remarkable is the level of cooperation between the team at Google Project Zero and Microsoft. Researcher Silvanovich released the finding as a tweet, which was followed by further explanations by Ormandy. The Microsoft security team picked up the alert immediately and worked over the weekend so that the patch could be released on May 9.

      I knew something was up when the computers in my office suddenly went into an update process and required a reboot shortly after they were turned on. Normally, my updates arrive at night, and if there’s a restart, it happens when they’re turned off at night. I also noted that the update took noticeably longer than most. Apparently fixing the vulnerability was more complex than most updates.

      The nature of this vulnerability discovery and fix is important because it underscores the value of cooperation in researching security. While some might complain that companies that share data are anti-competitive, the fact is that security is such a huge problem that it needs all available hands working on the issue. The fact that two competitors such as Google and Microsoft can cooperate is critical.

      Perhaps more important, it speaks to the only partly successful government attempts to encourage cooperation in security. Companies can work together for the benefit of all, provided they’re allowed to do so.

      Wayne Rash
      Wayne Rash
      https://www.eweek.com/author/wayne-rash/
      Wayne Rash is a content writer and editor with a 35-year history covering technology. He’s a frequent speaker on business, technology issues and enterprise computing. He is the author of five books, including his most recent, "Politics on the Nets." Rash is a former Executive Editor of eWEEK and a former analyst in the eWEEK Test Center. He was also an analyst in the InfoWorld Test Center and editor of InternetWeek. He's a retired naval officer, a former principal at American Management Systems and a long-time columnist for Byte Magazine.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×