Language Selection

English French German Italian Portuguese Spanish

Hackers probe Outlook Express flaw

Filed under
Microsoft

The risk of an attack related to a flaw in Microsoft Outlook Express climbed this week, after underground hacking sites began circulating sample code for exploiting it.

The exploit, which the French Security Incident Response Team drew attention to on Monday, is designed to take complete control of PCs with certain versions of the Outlook Express e-mail program installed on them, when users visit newsgroups controlled by the hackers.

But security experts said the risk of a widespread attack is low, because people must visit the malicious newsgroups for an attack to work. In addition, the exploit code that's in circulation has some glitches, said Michael Sutton, a lab director at security company iDefense.

It requires a reasonable amount of user intervention, which lowers the overall risk," Sutton said.

Nonetheless, iDefense urges people with vulnerable machines to install the patch Microsoft released last week to fix the flaw. The problem stems from a component of Outlook's newsreader program called Network News Transfer Protocol. The result of an attack could be serious.

"An attacker could install programs; view, change or delete data; or create new accounts with full user rights," Microsoft warned in a security bulletin for the patch last week. The company rated the vulnerability "important," which falls second to "critical" in its rating scale.

A Microsoft representative said the company is aware of the exploit code but is unaware of active attacks that have utilized it. Microsoft is monitoring the situation and is urging customers to apply its patch, the representative said. The company also directed people to report any attacks to Microsoft and the FBI.

The vulnerability has been found in several versions of Outlook Express, including releases 5.5 and 6.0 for Windows 2000, XP and Server 2003 machines, according to Microsoft. People don't have to launch the Outlook Express program, however, in order to fall victim to an attack.

Source.

More in Tux Machines

Leftovers: OSS

Development News

  • GCC 7 Moves Onto Only Regression/Doc Fixes, But Will Accept RISC-V & HSA's BRIG
    The GNU Compiler Collection (GCC) is entering its "stage four" development for GCC 7 with the stable GCC 7.1 release expected in March or April. Richard Biener announced today that GCC 7 is under stage four, meaning only regression and documentation fixes will be permitted until the GCC 7.1.0 stable release happens (yep, as per their peculiar versioning system, GCC 7.1 is the first stable release in the GCC 7 series).
  • 5 ways to expand your project's contributor base
    So many free and open source software projects were started to solve a problem, and people began to contribute to them because they too wanted a fix to what they encountered. End users of the project find it useful for their needs, and the project grows. And that shared purpose and focus attracts people to a project's community.
  • Weblate 2.10.1
    This is first security bugfix release for Weblate. This has to come at some point, fortunately the issue is not really severe. But Weblate got it's first CVE ID today, so it's time to address it in a bugfix release.

Intel Kabylake: Windows 10 vs. Linux OpenGL Performance

For those curious about the current Kabylake graphics performance between Windows 10 and Linux, here are some OpenGL benchmark results under each operating system. Windows 10 Pro x64 was tested and the Linux distributions for comparison were Ubuntu 16.10, Clear Linux, Antergos, Fedora 25 Xfce, and openSUSE Tumbleweed. Read more

Google's open-source Tilt Brush: Now you can create 3D movies in VR