The IBM cyber-security team, discovered the malware in May and said it was a â€œsignificant vulnerabilityâ€ in the operating system. The bug dubbed WinShock has been graded as 9.3 out of 10 on the Common Vulnerability Scoring System (CVSS), a measure of severity in computer security.
The flaw allowed any hacker to run code remotely whenever a user visited a malicious website. Microsoft has finally produced patches to fix the bug. The latest patch applies only to Windows Vista and higher devices as support for Windows XP ended in April.IBM researcher Robert Freeman described it as a â€œrare, â€˜unicorn-likeâ€™ bug found in code that IE [Microsoft Internet Explorer] relies on, but doesnâ€™t necessarily belong to.â€
“The bug can be used by an attacker for drive-by attacks to reliably run code remotely and take over the user’s machine,” Freeman wrote in a blog post.
IBM warns that the bug evaded detection for many years and states that more such undetected bugs could be out there. Security experts compared this latest flaw to other significant problems that had come to light this year such as the Heartbleed bug. However, they added that while its impact could be just as significant, it might be more difficult for attackers to exploit.
Gavin Millard, from Tenable Network Security, stated that although there has been no known attacks users should be careful.
“Whilst no proof-of-concept code has surfaced yet, due to Microsoft thankfully being tight-lipped on the exact details of the vulnerability, it won’t be long until one does, which could be disastrous for any admin that hasn’t updated.
“Is WinShock as bad as Heartbleed? At the moment, due to the lack of details and proof-of-concept code, it’s hard to say, but a remote code execution vulnerability affecting all versions of Windows server on a common component like Schannel is up there with the worst of them.”
Source: Digit India