September 23, 2010, 9:59 PM — Microsoft has warned users that hackers are exploiting the unpatched bug in ASP.Net to hijack encrypted Web sessions.
In a Monday update to a previously-published security advisory , Microsoft said that it was seeing "limited, active attacks at this time."
Symantec, which has a massive global network of sensors and honey trap-like systems to detect and capture exploits, said it had not seen any attacks, however.
The vulnerability exists in all versions of ASP.Net, the company's Web application framework used to craft millions of sites and applications, and lets attackers access Web applications with full administrator rights; decrypt session cookies or other encrypted data on a remote server; and access and snatch files from a site or Web application that relies on ASP.Net.
Microsoft acknowledged the flaw last Friday, the same day that a pair of researchers demonstrated how the "oracle padding" bug can be exploited by force-feeding cipher text to an ASP.Net application and noting the returned error messages it returns.
The company again promised to patch the vulnerability, but like last week, did not set a delivery date for the fix.
"We will be releasing a patch on Windows Update, so all machines will get it," said Scott Guthrie, the Microsoft executive who runs the ASP.Net development team.
The next regularly-scheduled security updates will ship Oct. 12, a little less than three weeks from today.
Occasionally Microsoft issues emergency patches -- called "out-of-band" updates -- to tackle problems, almost always after attacks appear.
Until the company releases a fix, Guthrie continued to urge Web site and application developers to plug the hole with a temporary workaround that involves editing the "web.config" file.
SharePoint Server 2007 and SharePoint 2010 are also vulnerable to ASP.Net attacks, said Microsoft. The SharePoint team has published different web.config editing instructions for its high-profile, highly-profitable collaboration software.