Stay up to date with notifications from The Independent

Notifications can be managed in browser preferences.

The Independent's journalism is supported by our readers. When you purchase through links on our site, we may earn commission.

Microsoft warns of 'critical' Windows security flaws

Ap
Wednesday 11 February 2004 01:00 GMT
Comments

Microsoft has warned customers about "critical" security problems with its Windows software that could let hackers quietly break into their computers to steal files, delete data or eavesdrop on sensitive information.

The US software giant, which learned about the flaws more than six months ago from researchers, said yesterday the only protective solution was to apply a repairing patch it offered on its website. It assessed the threat to computer users as "critical" - its highest rating.

A Microsoft security executive, Stephen Toulouse, said the flawed software was "an extremely deep and pervasive technology in Windows" and urged customers to apply the patch immediately.

The US Department of Homeland Security also warned Americans about the software problems with e-mails sent across its new national cyber-alert system.

Yesterday's disclosure comes just weeks before Microsoft Chairman Bill Gates delivers a keynote speech in San Francisco at one of the industry's most important security trade conferences. Microsoft has struggled in recent months against a tide of renewed criticism about security risks in its software, the engine for computers in most of the world's governments, corporations and homes.

"This is one of the most serious Microsoft vulnerabilities ever released," said Marc Maiffret of eEye Digital Security, which discovered the new Windows flaws.

"The breadth of systems affected is probably the largest ever. This is something that will let you get into Internet servers, internal networks, pretty much any system."

Maiffret said some computer systems that controlled critically important power or water utilities were vulnerable.

Maiffret predicted hackers would try to unleash a damaging Internet infection within weeks. Unlike earlier vulnerabilities that spawned such attacks, hackers can exploit the newly-disclosed flaws to break into susceptible computers using dozens of methods, making any defence far more difficult.

"The race will be on," agreed Marcus Sachs, a former White House adviser on cybersecurity.

Researchers at eEye discovered the problems last July and agreed to keep quiet about them until Microsoft could fix them. Maiffret complained that the delay between eEye's discovery and yesterday's public disclosure by Microsoft was "just totally unacceptable" because Windows users were broadly vulnerable during the period.

Toulouse said Microsoft took months because it wanted to ensure that a single repairing patch solved any related problems. "We really took the steps to make sure our investigation was as broad and deep as possible," he said.

Maiffret and Microsoft said they were unaware anyone had yet attacked Windows computers using the technique, although eEye had successfully tested the method to break into its own computers.

Microsoft's disclosure occurred just days before a presidential advisory council submits recommendations to the White House about ways technology companies should respond to major software vulnerabilities that could affect national security. The 54-page report, obtained by The Associated Press, cautions that "long delays in remediation can result in prolonged risk to end users".

The problems affected a technology in the newest versions of Windows known as "abstract syntax notation", a way to share data across different computers. Some of Microsoft's built-in security features - such as its Kerberos cryptography system - rely on the flawed software.

Microsoft urged consumers to apply the repairing patch immediately if they were using Windows NT, Windows 2000 or Windows XP versions of its software, or its Windows NT Server, Server 2000 and Server 2003 software commonly found in corporations.

To download the Microsoft "patch", go towww.microsoft.com/security/.

Join our commenting forum

Join thought-provoking conversations, follow other Independent readers and see their replies

Comments

Thank you for registering

Please refresh the page or navigate to another page on the site to be automatically logged inPlease refresh your browser to be logged in