Newsletters
The Enterprise Security Supersite NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Please click for more information, or scroll down to pass the ad, or Close Ad.
Home Network Security Viruses & Malware Hackers Security Solutions More Topics...
Eliminate costly downtime!
Find out how with Free White Paper
& enter to win a Samsung Galaxy Note

www.apc.com
Windows Security
24/7/365 Network Uptime
Average Rating:
Rate this article:  
Windows Security Patch Killing Some PCs
Windows Security Patch Killing Some PCs

By Jennifer LeClaire
April 12, 2013 10:52AM

Bookmark and Share
"We've determined that the update, when paired with certain third-party software, can cause system errors," said Microsoft's Dustin Childs. "As a precaution, we stopped pushing 2823324 as an update when we began investigating the error reports, and have since removed it from the download center." The bad patch affects Windows 7 and Server 2008 R2.
 


While talk heats up that Windows 8 is killing the PC market it turns out that a Windows 7 security patch may be literally knocking out some PCs. Microsoft is warning Windows 7 users to uninstall a security patch it issued earlier this week because some PCs won't restart after deploying the fix.

Specifically, Microsoft is advising users of both Windows 7 and Windows Server 2008 R2 to revert to the pre-patch state. These users should uninstall the patch in security bulletin MS 13-036. MS13-036 is another kernel mode drivers issue, similar to the other kernel issue this month.

"We've determined that the update, when paired with certain third-party software, can cause system errors," said Dustin Childs, group manager of Response Communications for Microsoft Trustworthy Computing. "As a precaution, we stopped pushing 2823324 as an update when we began investigating the error reports, and have since removed it from the download center."

Setting the Record Straight

Childs then moved to set the record straight. Contrary to some reports, he said, the system errors do not result in any data loss nor affect all Windows customers. However, he added, all customers should follow the guidance Microsoft has provided to uninstall the security update if it is already installed. That information can be found at support.microsoft.com/kb/2839011.

"[The patch] addresses a moderate-level vulnerability that requires an attacker to have physical computer access to exploit," Childs said. "MS13-036 remains available for download and is being pushed via updates to help protect customers against the other issues documented in the security bulletin -- it no longer contains the affected update."

What are the other issues? We asked Paul Henry, a forensics analyst at Lumension, for a rundown on the threats. He told us there are four Common Vulnerabilities and Exposures (CVE) in MS13-036.

"Three allow a local user to use kernel-raise conditions to elevate to system access. The fourth CVE is a moderate elevation of privilege issue, which is unusual for Microsoft. To leverage this CVE, an attacker would need to be an admin, which removes the need to leverage it," Henry said.

"Alternatively a low rights user would need to use a specially crafted external device, such as a USB. Last month, Microsoft had an interesting USB bug that got a lot of attention. This is nothing like that. Last month's bug allowed computers to be attacked regardless of the user's log-in status. This month's bug only allows a logged on, active system to be attacked, so log-on credentials are required. There are easier ways for an attacker to get in."

Pity on Microsoft?

Ken Pickering, development manager of security intelligence at Core Security, said that coming from an engineering background, he feels sorry for Microsoft. That's because many people don't realize that code fixes can be even more destructive than the original problem.

"That's why we invest so much time in QA to make sure the fix isn't actually worse than the problem. Unfortunately for Microsoft, it looks like they fell a bit short of this benchmark, and introduced an even more destructive fix than the 'moderate' privilege escalation bug they were trying to remediate," Pickering said.

"An even funnier statistic is how many potential security holes a security product can introduce versus how many would exist if the product was not running. Looking at Core's library of exploits against established security products or processes in Windows that are supposed to make the system more secure is humbling."
 

Tell Us What You Think
Comment:

Name:

Michael:

Posted: 2013-05-04 @ 12:40pm PT
Nice to tell us something we already know. Horrible because it offers no solution when, like me, my server 2008 R2 is dead and can't recover.



APC has an established a reputation for solid products that virtually pay for themselves upon installation. Who has time to spend worrying about system downtime? APC makes it easy for you to focus on business growth instead of business downtime with reliable data center systems and IT solutions. Learn more here.


 Windows Security
1.   Patch Tuesday Offers Critical Fixes
2.   Microsoft Pulls Plug on Windows XP
3.   Against a Wall, Some Buy XP Support
4.   Last Fixes Tuesday for XP, Office 2003
5.   Despite Its Age, XP Remains a Favorite


advertisement
Last Fixes Tuesday for XP, Office 2003
Microsoft closing out support for two.
Average Rating:
Windows 8 Updates Expected Soon
Using OS feedback, security concerns.
Average Rating:
Microsoft Pulls Plug on Windows XP
Third-party workarounds abound.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
What Verizon's Data Breach Report Can Teach Enterprises
It’s probably not a jaw-dropper, but cyberespionage is officially on the rise. And the use of stolen or misused credentials is still the leading way the bad guys gain access to corporate information.
 
Top Cyberthreats Exposed by Verizon Report
Beyond Heartbleed, there are cyberthreats vying to take down enterprise networks, corrupt smartphones, and wreak havoc on businesses. Verizon is exposing these threats in a new report.
 
Where Do Web Sites Stand, Post-Heartbleed?
A security firm says the vast majority of Web sites have patched themselves to protect against the Heartbleed bug, but now there are questions raised on the reliability of open-source programs.
 

Navigation
Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Hackers | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.