Categories: PCSecurityWorkspace

New Microsoft Windows 7 Flaw Found

A new bug, which could allow hackers to seize control of 64-bit versions of Windows 7 and Windows Server 2008 R2 has been revealed in a warning from Microsoft.

Microsoft’s warning says the flaw is difficult to exploit, but the 64-bit edition of Windows 7 has an error in the Canonical Display Driver (CDD), which also affects Windows Server 2008 R2 x64 as well as Windows Server 2008 R2 for Itanium systems. The CDD is used by desktop composition to blend the Windows graphics device interface and DirectX drawing.

Hard to exploit

According to Microsoft, CDD does not properly parse information copied from user mode to kernel mode, and an attacker could exploit the vulnerability to cause an affected system to stop responding and automatically restart. It is also possible for an attacker to exploit the bug to run arbitrary code, but memory randomisation makes this difficult.

An attacker who attempts to exploit this issue for code execution would need to write executable content to a specific space in kernel memory,” Microsoft wrote in the advisory. “However, since the starting address will be random, the final pointer destination will be difficult to predict. The implementation of Address Space Layout Randomization (ASLR) by default on affected systems further complicates this prediction.”

In addition, the vulnerability only affects Windows systems if they have the Aero theme installed, and it is not switched on by default in Windows Server 2008 R2, noted Jerry Bryant, group manager of Microsoft Security Response Center communications.

“With that in mind, we are giving this vulnerability a preliminary Exploitability Index rating of 3, meaning we’ve deduced so far that reliable exploit code is unlikely,” blogged Bryant. “We’re currently developing a security update for Windows that will address the vulnerability. In the meantime, customers may choose to disable Windows Aero as a workaround to protect against potential threats. With Aero disabled, the path by which cdd.dll can be exploited is bypassed.”

Instructions on disabling Aero are contained within the advisory under “Suggested Actions.”

Microsoft patched two security flaws in last week’s routine “patch Tuesday” release


Brian Prince eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved

Share
Published by
Brian Prince eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved
Tags: Windows 7

Recent Posts

Microsoft Beats Expectations Thanks To AI Investments

Customer adoption of AI services embedded in cloud services continues to deliver results for Microsoft,…

2 days ago

Google Delays Removal Of Third-Party Cookies, Again

For third time Google delays phase-out of third-party Chrome cookies after pushback from industry and…

3 days ago