Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Denial of Service Bug Could Cripple Microsoft Malware Protection Engine

Microsoft Releases Security Advisory for Microsoft Malware Protection Engine

Microsoft Releases Security Advisory for Microsoft Malware Protection Engine

Microsoft released a security advisory on Tuesday to warn customers of a vulnerability (CVE-2014-2779) in the Microsoft Malware Protection Engine that could cause a denial of service condition if the engine scans a “specially crafted file”.

If successfully exploited, the vulnerability could prevent the Microsoft Malware Protection Engine from monitoring affected systems until the specially crafted file is manually removed and the service is restarted, Microsoft said.

There are several ways an attacker could place a maliciously crafted file in a location scanned by the Microsoft Malware Protection Engine in order to exploit the vulnerability and crash a system or halt malware protection scanning.

“For example, an attacker could use a website to deliver a specially crafted file to the victim’s system that is scanned when the website is viewed by the user,” Microsoft explained. “An attacker could also deliver a specially crafted file via an email message or in an Instant Messenger message that is scanned when the file is opened. In addition, an attacker could take advantage of websites that accept or host user-provided content, to upload a specially crafted file to a shared location that is scanned by the Malware Protection Engine running on the hosting server.”

The vulnerability could also cause an application to close or quit unexpectedly without automatically recovering, and exploitation of the vulnerability could occur when the system is scanned using an affected version of Microsoft’s Malicious Software Removal Tool (MSRT).

The Microsoft Malware Protection Engine (mpengine.dll) ships with several Microsoft antimalware products and provides the scanning, detection, and cleaning capabilities for Microsoft antivirus and antispyware software.

Microsoft has provided updates for the following affected software:

Advertisement. Scroll to continue reading.

• Microsoft Forefront Client Security

• Microsoft Forefront Endpoint Protection 2010

• Microsoft Forefront Security for SharePoint Service Pack 3

• Microsoft System Center 2012 Endpoint Protection

• Microsoft System Center 2012 Endpoint Protection Service Pack 1

• Microsoft Malicious Software Removal Tool (Applies only to May 2014 or earlier versions)

• Microsoft Security Essentials

• Microsoft Security Essentials Prerelease

• Windows Defender for Windows 8, Windows 8.1, Windows Server 2012, and Windows Server 2012 R2

• Windows Defender for Windows RT and Windows RT 8.1

• Windows Defender for Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2

• Windows Defender Offline

• Windows Intune Endpoint Protection

For the most part, no action is required of enterprise administrators or end users to install the update, but Microsoft suggested that administrators of enterprise installations follow their established internal processes to ensure that the definition and engine updates are approved in their update management software, and that clients consume the updates accordingly.

According to Microsoft, the built-in mechanism for the automatic detection and deployment of updates will apply the update within 48 hours of release, with the exact time frame depending on the software used, Internet connection, and infrastructure configuration.

Tavis Ormandy of Google Project Zero reported the bug to Microsoft, and it is not believed that the vulnerability has been exploited in the wild.

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Mike Dube has joined cloud security company Aqua Security as CRO.

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.