Microsoft Warns Of Web Proxy Flaw - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Software // Enterprise Applications
News
12/4/2007
02:33 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Microsoft Warns Of Web Proxy Flaw

The vulnerability was patched in 1999 but has since resurfaced in subsequent versions of Windows.

Microsoft on Monday issued a security advisory about a possible flaw in the way Windows resolved certain domain names.

"Microsoft is investigating new public reports of a vulnerability in the way Windows resolves hostnames that do not include a fully-qualified domain name (FQDN)," the company said in a security advisory. "The technology that the vulnerability affects is Web Proxy Auto-Discovery (WPAD)."

Microsoft said it is not aware of any attacks on its customers that exploit this flaw.

The vulnerability was patched in 1999 but has since resurfaced in subsequent versions of Windows, a resurrection reminiscent of a security flaw in Apple Mail that was fixed last year and was subsequently reintroduced. It was discussed recently at Kiwicon '07, a computer security and hacking conference held in New Zealand.

"Customers whose domain name begins in a third-level or deeper domain, such as 'contoso.co.us,' or for whom the following mitigating factors do not apply, are at risk from this vulnerability," Microsoft warns.

The problem arises when affected versions of Windows attempt to resolve a third-level domain, or subdomain, by querying a nonexistent or inaccessible WPAD server on the network. Failing to find the information it needs to resolve the subdomain inside the network, affected versions of Windows will automatically expand such a search, possible to untrusted WPAD servers, which could point DNS requests to a malicious source.

Microsoft customers who have a trusted WPAD server in their organizations, have a manually specified proxy server in Internet Explorer, or who have disabled "Automatically Detect Settings" in Internet Explorer are not at risk from this issue.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Slideshows
Data Science: How the Pandemic Has Affected 10 Popular Jobs
Cynthia Harvey, Freelance Journalist, InformationWeek,  9/9/2020
Commentary
The Growing Security Priority for DevOps and Cloud Migration
Joao-Pierre S. Ruth, Senior Writer,  9/3/2020
Commentary
Dark Side of AI: How to Make Artificial Intelligence Trustworthy
Guest Commentary, Guest Commentary,  9/15/2020
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
IT Automation Transforms Network Management
In this special report we will examine the layers of automation and orchestration in IT operations, and how they can provide high availability and greater scale for modern applications and business demands.
Slideshows
Flash Poll