Language Selection

English French German Italian Portuguese Spanish

Hackers probe Outlook Express flaw

Filed under
Microsoft

The risk of an attack related to a flaw in Microsoft Outlook Express climbed this week, after underground hacking sites began circulating sample code for exploiting it.

The exploit, which the French Security Incident Response Team drew attention to on Monday, is designed to take complete control of PCs with certain versions of the Outlook Express e-mail program installed on them, when users visit newsgroups controlled by the hackers.

But security experts said the risk of a widespread attack is low, because people must visit the malicious newsgroups for an attack to work. In addition, the exploit code that's in circulation has some glitches, said Michael Sutton, a lab director at security company iDefense.

It requires a reasonable amount of user intervention, which lowers the overall risk," Sutton said.

Nonetheless, iDefense urges people with vulnerable machines to install the patch Microsoft released last week to fix the flaw. The problem stems from a component of Outlook's newsreader program called Network News Transfer Protocol. The result of an attack could be serious.

"An attacker could install programs; view, change or delete data; or create new accounts with full user rights," Microsoft warned in a security bulletin for the patch last week. The company rated the vulnerability "important," which falls second to "critical" in its rating scale.

A Microsoft representative said the company is aware of the exploit code but is unaware of active attacks that have utilized it. Microsoft is monitoring the situation and is urging customers to apply its patch, the representative said. The company also directed people to report any attacks to Microsoft and the FBI.

The vulnerability has been found in several versions of Outlook Express, including releases 5.5 and 6.0 for Windows 2000, XP and Server 2003 machines, according to Microsoft. People don't have to launch the Outlook Express program, however, in order to fall victim to an attack.

Source.

More in Tux Machines

today's howtos

KaOS 2016.06 Moves the Distro to Linux Kernel 4.6, Adds Full-Disk Encryption

The developers of the KaOS Linux operating system have had the great pleasure of announcing the release and immediate availability for download of the KaOS 2016.06 ISO image with some very exciting goodies. First and foremost, the devs have decided to move the distribution from the long-term supported Linux 4.4 kernel series to Linux kernel 4.6, which makes it possible to fully automate the early microcode update. Furthermore, the default desktop environment has been migrated to the Beta of the upcoming KDE Plasma 5.7. Read more

Tiny Core Linux 7.2 Enters Development, First Release Candidate Is Out Now

The developers of one of the smallest GNU/Linux operating systems, Tiny Core, have announced that the next point release in the Tiny Core Linux 7 series, version 7.2, is now open for development. Tiny Core Linux 7.2 RC1 (Release Candidate 1) has been released today, June 25, 2016, and it lets early adopters and public testers get an early taste of what's coming to the final Tiny Core Linux 7.2 operating system in the coming weeks. Read more

Huawei CEO: Will keep using Android as long as it's open

He made the said comment in a Weibo post, where-in he also noted that Google's mobile OS has promoted the development of smartphones, which in turn has benefited consumers. Interestingly, he didn't say anything about whether or not Huawei is developing an in-house mobile OS - said to be called Kirin OS. His silence on the matter, though, can be taken as a confirmation of sorts, especially when his comment reflects the possibility of Google restricting the companies’ freedom with Android in future. Read more Also: Huawei CEO Comments On Rumors about its Independent OS