Microsoft sample attack code may have leaked

Security

by CBR Staff Writer| 20 March 2012

Company recommends customers to deploy MS12-020 as soon as possible


Microsoft has confirmed that a sample attack code created by the company could have been leaked to hackers.

Microsoft director of Trustworthy Computing Ynsun Wee, in a corporate blog post, said on March 15, Microsoft became aware of public proof-of-concept code that results in denial of service for the issue addressed by MS12-020, which the company released on Tuesday.

The company recommended customers to deploy MS12-020 as soon as possible, as this security update protects against attempts to exploit CVE-2012-0002.

Microsoft is additionally offering a one-click Fix It to help mitigate risk for those customers who need time to test the update before deploying it.

The details of the proof-of-concept code appear to match the vulnerability information shared with Microsoft Active Protections Program (MAPP) partners, though Microsoft said it is not aware of public proof-of-concept code that results in remote code execution.

Microsoft stated it is actively investigating the disclosure of these details and will take the necessary actions to protect customers and ensure that confidential information is protected.

The Microsoft Active Protections Program, launched in 2008, supplies Microsoft vulnerability information to security software partners prior to Microsoft's monthly security update release so partners can build enhanced customer protections.

Comments
Post a comment

Comments may be moderated for spam, obscenities or defamation.

Join our network

741 people like this.
0 people follow this.

Security Intelligence

Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.