Support Overview

Help Desk

Online Service Request

Emergency IT Support

Security Alerts

Computer Usage Tips

Security Alerts

Security Watch: Microsoft Out-of-Band Patches for ATL
7/28/2009

Microsoft released two security bulletins today--one Internet Explorer bulletin and one Visual Studio bulletin--in a so called Out-of-Band release (outside their normal schedule of the second Tuesday of each month).  We previously warned that the flaw in Microsoft Video ActiveX control is deeper than the patch in Microsoft security bulletin MS09-032. These two security bulletins address that deeper flaw.

The fact that these security bulletins were released out-of-band is an indication that Microsoft feels that the fix needs to be installed right away. Why the fixes are so urgent is not immediately clear since Microsoft stated that if the patch in Microsoft security bulletin MS09-032 has been installed, systems are not vulnerable and there are currently no other know exploits.  The underlying flaw in the Visual Studio Active Template Library (ATL) is being presented at the Black Hat conference in Las Vegas this week (on Wednesday).  We now suspect that the urgency of Microsoft's out-of-band release is to provide defense from exploits created based on the information that will be disclosed at the Black Hat conference.

The scope of the flaw in ATL is huge because it affects not only Microsoft products, but also any component or control developed using the flawed ATL.  It will take time for developers to release updates to their products that use the ATL without the flaw.

The second of the two security bulletins released today (the one that patches Visual Studio ATL) is the root cause of the flaw.  The cumulative security update for Internet Explorer (the first of the two security bulletins) includes what Microsoft calls "Defense in Depth" in that it attempts to block ActiveX controls built on the flawed ATL.

Threat Level

Watch:  Details about a vulnerability will be presented soon.

(A "watch" alert is for a situation that is not currently being exploited--that we know about--but it is possible that it will be exploited soon.)

Severity:  Medium-High.  If the update in Microsoft security bulletin MS09-032 has been installed, systems are not vulnerable.  The vulnerability allows consistent exploit code that is easy and reliable, but there are no know exploits beyond those fixed by Microsoft security bulletin MS09-032.

Affected Software

Many non-Microsoft software products.  Internet Explorer adds defense in depth.

Analysis

Vulnerabilities potentially exist in programs written with the Microsoft Active Template Library (ATL) that could allow code execution by browsing to a web site with malicious content. At this time, no systematic attack is known to exist.

Some programmers might have used Microsoft-supplied code (ATL) and might not realize that their code is unsafe.  Many different vendors’ code is likely to be found vulnerable, and each will have to release a non-exploitable version if theirs is vulnerable due to this issue. 

The Visual  Studio patch in Microsoft security bulletin MS09-035 addresses three flaws: kill bit bypass, information disclosure, and remote code execution. Microsoft said that consistent exploit code is easy and reliable.  The kill bit bypass flaw is being demonstrated at the Blackhat conference this week.  This update corrects the flawed template (ATL) so that any controls built from this template going forward will be safe. 

Microsoft security bulletin MS09-034 is a cumulative security update for Internet Explorer (IE).  It includes two types of what Microsoft calls "Defense in Depth".  It also includes fixes for three vulnerabilities in IE.

Defense in Depth is designed to protect customers from Web-based attacks. This part of the patch does not address a flaw in IE. It does not address the underlying vulnerabilities and developers still need to release updates for any components or controls that have the ATL vulnerability.

The first defense in depth measure monitors calls to ActiveX controls and prevents controls from executing that are found to have been developed with the flawed ATL. Some security researchers found that they were able to bypass the kill bit function and execute certain controls.  The IE cumulative security update protects against the kill bit bypass problem.

The second defense in depth measure provides stronger protection, but increases application compatibility risk.  It is disabled by default.  It implements an allow list for ActiveX controls.

The IE cumulative security update is not just the defense in depth updates, but also includes updates for three remote code execution vulnerabilities.

How Do I Protect My Computer

If your system has Microsoft Automatic Update enabled, you have (or very soon will get) the update for Internet Explorer that provides defense for future exploits of the ATL vulnerability.  You will need to restart your PC for this update to take effect.

If your systems already have the patch in Microsoft security bulletin MS09-032 installed, you are protected from current exploits and the vulnerabilities in Microsoft products.  To get defense from exploits of non-Microsoft software products, install the update in Microsoft security bulletin MS09-034.  We do not believe that this update requires an emergency deployment and can be scheduled for some time in the next few days (but before new exploits can be effective).

The ultimate solution to all these ActiveX control vulnerabilities might be to take a "white list" approach and allow only known good ActiveX controls that an administrator approves (via a GPO).  (This is the opposite of the current kill bit method where known bad ActiveX controls are prevented from running.)  Microsoft added a feature to do white listing of ActiveX controls in the IE Cumulative Security Update.  (This feature is disabled by default.)  Of course the problem with such an approach is keeping up with the list of ActiveX controls that all your users will need to have approved.

The update in Microsoft security bulletin MS09-035 is intended for developers. Unless you are a software developer, you do not need to install this update.

More Information

Microsoft Security Advisory:
http://www.microsoft.com/technet/security/advisory/973882.mspx

Microsoft Security Bulletins:

Cumulative Security Update for Internet Explorer: http://www.microsoft.com/technet/security/bulletin/ms09-034.mspx

Vulnerabilities in Visual Studio  Active Template Library  Could  Allow  Remote  Code Execution:  http://www.microsoft.com/technet/security/bulletin/ms09-035.mspx

Managed Services

IT Professional Services is closely monitoring the development of this situation. Since all of systems under managed care are up-to-date on security updates, it appears that an emergency deployment of this update will not be necessary unless other exploits make use of a vulnerability.  Should it become necessary, ITPS will be prepared to perform an emergency deployment of the update to protect all systems under managed care and will deploy the update within a few days of its release (most likely in conjunction with the Adobe Flash vulnerability for which we are expecting an update from Adobe in the next few days.

Professional Services

If you need assistance installing protection from this vulnerability or a security assessment, IT Professional Services can help. Call our help desk.

Find out more about our managed care service.

To find out how vulnerable your network is schedule a free network security analysis today.

We at IT Professional Services (ITPS) hope that the information in this bulletin is valuable to you. ITPS believes the information provided herein is reliable. While care has been taken to ensure accuracy, your use of the information contained in this bulletin is at your sole risk. All information in this bulletin is provided "as-is", without any warranty, whether express or implied, of its accuracy, completeness, fitness for a particular purpose, title or non-infringement, and none of the third-party products or information mentioned in the bulletin are authored, recommended, supported or guaranteed by ITPS. ITPS shall not be liable for any damages you may sustain by using this information, whether direct, indirect, special, incidental or consequential, even if it has been advised of the possibility of such damages.

Privacy Policy

© 2009-2013 IT Professional Services All rights are reserved.  (805) 650-6030