"If an attacker manages to redirect targeted users to a malicious proxy, they could obtain private information, redirect them to malicious pages in order to infect them with malware, or monitor their Internet movements," said Luis Corrons, technical director at PandaLabs.
This vulnerability could be used to launch "man-in-the-middle" attacks on Windows DNS servers. Clients have to download WPAD entries from the DNS server, and these entries could be affected by the attack. An attacker, who could exploit this vulnerability, may successfully redirect users' traffic through a malicious proxy.
However, the laboratory further advises the users who use these systems to be extra cautious and to keep an eye on new Microsoft updates to patch this vulnerability, to patch it as soon as possible.
Welcome to the Proxy Update, your source of news and information on Proxies and their role in network security.
Friday, March 20, 2009
Microsoft Security Update Fails
PandaLab's IT security laboratory has issued an advisory to users against Microsoft's MS09-008 update released recently, which is designed to fix vulnerabilities in the Windows DNS server and WINS server. According to the press statement, an unpatched flaw has been detected in the DNS server, specifically in WPAD (Web Proxy Autodiscovery Protocol) registration.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment