Patch Tuesday fixes critical Bluetooth flaw in Windows 7

There are only four bulletins, but one of them is related to a critical flaw in Windows 7 and Windows Vista.

By Tony Bradley, PC World |  Security, bluetooth, Microsoft

Patch Tuesday has arrived. As expected, Microsoft released a relatively small number of patches for July, but that is no reason for IT admins to let their guard down--especially when one of the patches is a Critical update for Windows 7 and Windows Vista.

There are three security bulletins rated as Important that impact Windows and Microsoft Office. One is related to Microsoft Visio, one is connected to the client / server runtime subsystem, and the third has to do with kernel-mode drivers. But, the security bulletin that is hogging the attention this month is MS11-053.

According to Microsoft, the critical flaw lays in the Windows Bluetooth Stack--the driver that enables Windows to connect with Bluetooth devices. An attacker may be able to remotely compromise and gain full access to a vulnerable system via its Bluetooth networking. Microsoft also points out, though, that this vulnerability only affects systems with Bluetooth capability.

Joshua Talbot, Security Intelligence Manager at Symantec Security Response, explains, "An attacker would exploit this by sending specific malicious data to the targeted computer while establishing a Bluetooth connection," adding that a successful exploit would grant the attacker complete access to the system without any alert or notification to warn the targeted user that a rogue PC has connected via Bluetooth.

Andrew Storms, Director of Security Operations for nCircle, agrees that MS11-053 is serious, but with some caveats. "This seems pretty scary at first glance, but it's a good idea to consider the details of the vulnerability before getting all worked up about it. This bug requires that Bluetooth on a PC be set in 'discoverable' mode, and this is not the default setting. If Bluetooth is not set to 'discoverable', the attacker will need to use another approach to attack the PC before they can take advantage of the Bluetooth bug."

Talbot concurs, stating, "It's unlikely it could be used in a widespread attack because an attacker would have to be within Bluetooth range to exploit it. Thus, a specific target would likely already have to be identified and that person's whereabouts known to the attacker."

Originally published on PC World |  Click here to read the original story.
Join us:






Spotlight on ...
Online Training

    Upgrade your skills and earn higher pay

    Readers to share their best tips for maximizing training dollars and getting the most out self-directed learning. Here’s what they said.


    Learn more

Answers - Powered by ITworld

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Ask a Question