SHARE
Facebook X Pinterest WhatsApp

Did Microsoft Patch Miss the Mark?

An anonymous security researcher has posted a proof-of-concept exploit for a flaw patched in Microsoft’s “critical” MS06-035 bulletin, but the company’s security response team says the issue is actually a brand-new, unpatched vulnerability. The researcher, who uses the online moniker “cocoruder,” published the attack code on the Milw0rm Web site alongside a claim that it […]

Written By
thumbnail Ryan Naraine
Ryan Naraine
Jul 31, 2006
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

An anonymous security researcher has posted a proof-of-concept exploit for a flaw patched in Microsoft’s “critical” MS06-035 bulletin, but the company’s security response team says the issue is actually a brand-new, unpatched vulnerability.

The researcher, who uses the online moniker “cocoruder,” published the attack code on the Milw0rm Web site alongside a claim that it exploits a memory corruption in Mailslot to trigger a blue-screen Windows crash.

Microsoft shipped a Mailslot fix in the MS06-035 update released on July 11, but although the published code targets a similar flaw, Microsoft insists the exploit does not affect the same code path or functionality or vulnerability that was addressed by the update.

“We now have a good understanding of the issue and we are conducting a thorough investigation into this area of code to make sure we can deliver a security update that is complete and meets our quality bar,” said Adrian Stone, a program manager in Microsoft’s security response center.

In a blog entry posted on July 28, Stone said the proof-of-concept is limited to a denial of service that would cause the target host to crash. “At this time we have not identified any possibilities with this issue that could allow remote code execution,” he said.

“We have not observed or received any reports of the [exploit] being used to actively attack systems,” Stone added.

Because the vulnerability exists in the Server Message Block protocol that runs on TCP ports 139 and 445, Microsoft recommends that these ports should be blocked at perimeter firewalls, both inbound and outbound.

After reviewing the exploit code, researchers at the ISS X-Force vulnerability research unit described the bug as a “null pointer
dereference” in the server driver (srv.sys).

Click here to read more about the exploit code.

“By sending a specially-crafted network packet to an affected system, a remote attacker could cause the system to crash,” the company said in an alert published July 28.

“Users must reboot to recover from the crash. An exploit is available in the wild. As of this writing no patch is available for the vulnerability,” the company warned.

Affected software includes fully patched versions of 2000 SP4, Windows Server 2003 and Windows XP SP2.

The alert said it is “unlikely” that the new flaw could result in remote code execution but warned that “complete system crashes are reliable.”

Check out eWEEK.com’s for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzer’s Weblog.

Recommended for you...

Manny Rivelo on Evolving Channel & How MSPs Can Get Ahead
Victoria Durgin
Aug 20, 2025
Databricks Raises at $100B+ Valuation on AI Momentum
Allison Francis
Aug 20, 2025
Keepit Achieves SOC 2 Type 1 & Canadian Ingram Micro Deal
Jordan Smith
Aug 20, 2025
AI Customer Service Fails to Satisfy Consumer Needs: Verizon
Franklin Okeke
Aug 19, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.