{"id":219517,"date":"2017-06-14T17:08:25","date_gmt":"2017-06-14T21:08:25","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/rare-xp-patches-fix-three-remaining-leaked-nsa-exploits-threatpost.php"},"modified":"2017-06-14T17:08:25","modified_gmt":"2017-06-14T21:08:25","slug":"rare-xp-patches-fix-three-remaining-leaked-nsa-exploits-threatpost","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/rare-xp-patches-fix-three-remaining-leaked-nsa-exploits-threatpost.php","title":{"rendered":"Rare XP Patches Fix Three Remaining Leaked NSA Exploits &#8211; Threatpost"},"content":{"rendered":"<p><p>    The unusual decision Microsoft made to release patches on    Tuesday     for unsupported versions of Windows was prompted by three    NSA exploits that remained unaddressed from     Aprils ShadowBrokers leak.  <\/p>\n<p>    The worst of the bunch, an attack called ExplodingCan    (CVE-2017-7269), targets older versions of Microsofts Internet    Information Services (IIS) webserver, version 6.0 in    particular, and enables an attacker to gain remote code    execution on a Windows 2003 server.  <\/p>\n<p>    All three attacks allow an adversary to gain remote code    execution; one is EsteemAudit, a vulnerability in the Windows    Remote Desktop Protocol (RDP) (CVE-2017-0176), while the other    is EnglishmanDentist (CVE-2017-8487), a bug in OLE (Object    Linking and Embedding). Microsoft said     the patches are available for     manual download.  <\/p>\n<p>    ExplodingCan merits a closer look because of the wide    deployment of IIS 6.0.  <\/p>\n<p>    Generally, when you put a Windows machine on the internet,    its going to be a server and its going to run a webserver, so    there are production machines on the internet running IIS 6.0    right now, said Sean Dillon, senior analyst at RiskSense and    one of the first to analyze the     NSAs EternalBlue exploit that spread     WannaCry ransomware on May 12.  <\/p>\n<p>    Its probably already been exploited for months now, Dillon    said. At least now theres a fix thats publicly available.  <\/p>\n<p>    Microsoft released a hefty load of patches for supported    products and services on Tuesday as part of     its normal Patch Tuesday update cycle. Normally, patches    for unsupported versions of Windows are available only for    Microsoft customers on an expensive extended support contract.    The companys decision to make all of those fixes public on    Tuesday, it said, was prompted by an elevated risk for    destructive    cyber attacks.  <\/p>\n<p>    Due to the elevated risk for destructive cyber attacks at this    time, we made the decision to take this action because applying    these updates provides further protection against potential    attacks with characteristics similar to WannaCrypt, said    Adrienne Hall, general manager of Microsofts Cyber Defense    Operations Center.  <\/p>\n<p>    In reviewing the updates for this month, some vulnerabilities    were identified that pose elevated risk of cyber attacks by    government organizations, sometimes referred to as nation-state    actors or other copycat organizations, Hall said. To address    this risk, today we are providing additional security updates    along with our regular Update Tuesday service. These security    updates are being made available    toallcustomers, including those    using older versions of Windows.  <\/p>\n<p>    The ShadowBrokers leak in April unleashed a number of powerful    Windows attacks into the public, allegedly belonging to the    Equation Group, which is widely believed to the U.S. National    Security Agency. Criminals and other nation states have already    been leveraging the attacks to spread not only WannaCry    ransomware, but also     crytpocurrency mining utilities and     other types of malware.  <\/p>\n<p>    Microsoft said customers should not expect this type of patch    release for unsupported products to become the norm. Some    experts have been critical of Microsot, which also made a    similar update available for unsupported products hours after    the WannaCry outbreak.  <\/p>\n<p>      I wish MS would stop releasing patches for xp\/2003 it really      harms efforts to get rid of legacy in the corporates    <\/p>\n<p>       Quentyn Taylor (@quentynblog) June      13, 2017    <\/p>\n<p>      Oh no. Take Windows XP off life support. Though it cannot die      with dignity, it must be allowed to die. It will be messy.      But this is cruel. <a href=\"https:\/\/t.co\/euZVdTLC0z\" rel=\"nofollow\">https:\/\/t.co\/euZVdTLC0z<\/a>    <\/p>\n<p>       Katie Moussouris (@k8em0) June      13, 2017    <\/p>\n<p>    It was the right move by Microsoft, Dillon said. We saw the    damage it can cause with WannaCry. Some of the most-used    infrastructure, like SCADA systems, still run on XP whether    theyre getting patches or not. When you have critical things    [running on XP], its a good thing they released, but it should    only be looked at as a temporary solution and people should    look to upgrade off of legacy versions.  <\/p>\n<p>    Some third-party services such as 0patch have provided micro-patches for some of these    vulnerabilities on legacy versions, even before the    ShadowBrokers leak, Dillon said. Hopefully people who are    running legacy systems have looked into other means of patching    beside official fixes, he said. Although, this is great that    theres an official fix.  <\/p>\n<p>    The remaining two vulnerabilities are a lesser severity but    should be patched nonetheless on legacy systems.  <\/p>\n<p>    EsteemAudit affects RDP, but only on XP and did not require a    patch for modern versions of Windows. According to Microsoft,    the vulnerability exists if the RDP server has smart card    authentication enabled.  <\/p>\n<p>    EnglishmanDentist, meanwhile, is triggered because Windows OLE    fails to properly validate user input, Microsoft said.  <\/p>\n<p>    Theres a whole wide assortment of exploits that were leaked,    and weve only seen a few of them actively used at a mass    scale. This is just plugging a hole before it becomes a bigger    problem, Dillon said.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the article here: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/threatpost.com\/rare-xp-patches-fix-three-remaining-leaked-nsa-exploits\/126256\/\" title=\"Rare XP Patches Fix Three Remaining Leaked NSA Exploits - Threatpost\">Rare XP Patches Fix Three Remaining Leaked NSA Exploits - Threatpost<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The unusual decision Microsoft made to release patches on Tuesday for unsupported versions of Windows was prompted by three NSA exploits that remained unaddressed from Aprils ShadowBrokers leak. The worst of the bunch, an attack called ExplodingCan (CVE-2017-7269), targets older versions of Microsofts Internet Information Services (IIS) webserver, version 6.0 in particular, and enables an attacker to gain remote code execution on a Windows 2003 server. All three attacks allow an adversary to gain remote code execution; one is EsteemAudit, a vulnerability in the Windows Remote Desktop Protocol (RDP) (CVE-2017-0176), while the other is EnglishmanDentist (CVE-2017-8487), a bug in OLE (Object Linking and Embedding).  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/rare-xp-patches-fix-three-remaining-leaked-nsa-exploits-threatpost.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-219517","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/219517"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=219517"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/219517\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=219517"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=219517"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=219517"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}