Categories: PCSecurityWorkspace

New Microsoft Windows 7 Flaw Found

A new bug, which could allow hackers to seize control of 64-bit versions of Windows 7 and Windows Server 2008 R2 has been revealed in a warning from Microsoft.

Microsoft’s warning says the flaw is difficult to exploit, but the 64-bit edition of Windows 7 has an error in the Canonical Display Driver (CDD), which also affects Windows Server 2008 R2 x64 as well as Windows Server 2008 R2 for Itanium systems. The CDD is used by desktop composition to blend the Windows graphics device interface and DirectX drawing.

Hard to exploit

According to Microsoft, CDD does not properly parse information copied from user mode to kernel mode, and an attacker could exploit the vulnerability to cause an affected system to stop responding and automatically restart. It is also possible for an attacker to exploit the bug to run arbitrary code, but memory randomisation makes this difficult.

An attacker who attempts to exploit this issue for code execution would need to write executable content to a specific space in kernel memory,” Microsoft wrote in the advisory. “However, since the starting address will be random, the final pointer destination will be difficult to predict. The implementation of Address Space Layout Randomization (ASLR) by default on affected systems further complicates this prediction.”

In addition, the vulnerability only affects Windows systems if they have the Aero theme installed, and it is not switched on by default in Windows Server 2008 R2, noted Jerry Bryant, group manager of Microsoft Security Response Center communications.

“With that in mind, we are giving this vulnerability a preliminary Exploitability Index rating of 3, meaning we’ve deduced so far that reliable exploit code is unlikely,” blogged Bryant. “We’re currently developing a security update for Windows that will address the vulnerability. In the meantime, customers may choose to disable Windows Aero as a workaround to protect against potential threats. With Aero disabled, the path by which cdd.dll can be exploited is bypassed.”

Instructions on disabling Aero are contained within the advisory under “Suggested Actions.”

Microsoft patched two security flaws in last week’s routine “patch Tuesday” release


Brian Prince eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved

Share
Published by
Brian Prince eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved
Tags: Windows 7

Recent Posts

Northvolt Mulls US Bankruptcy Protection – Report

Troubled battery maker Northvolt reportedly considers Chapter 11 bankruptcy protection in the United States as…

9 hours ago

FTC Plans Investigation Into Microsoft Cloud Business – Report

Microsoft's cloud business practices are reportedly facing a potential anti-competitive investigation by the FTC

11 hours ago

Programmer Sentenced To Five Years In Prison For Bitcoin Laundering

Ilya Lichtenstein sentenced to five years in prison for hacking into a virtual currency exchange…

13 hours ago

Hate Speech Watchdog CCDH To Quit Musk’s X

Target for Elon Musk's lawsuit, hate speech watchdog CCDH, announces its decision to quit X…

1 day ago

Meta Fined €798m Over Alleged Facebook Marketplace Violations

Antitrust penalty. European Commission fines Meta a hefty €798m ($843m) for tying Facebook Marketplace to…

1 day ago

Elon Musk Rebuked By Italian President Over Migration Tweets

Elon Musk continues to provoke the ire of various leaders around the world with his…

1 day ago