Slash Microsoft bugs by 92 %

Nine of out 10 critical bugs reported by Microsoft last year could have been made moot, or at least made less dangerous, if people ran Windows without administrative rights, a developer of enterprise rights management software claimed Tuesday.

BeyondTrust Corp. , which touts its Privilege Manager as a way for companies to lock down PCs, tallied the individual vulnerabilities that Microsoft disclosed in 2008, then examined each accompanying security bulletin. If the bulletin’s “Mitigating Factors” section, the part that spells out how to lessen the risk of attack or eliminate it entirely, said that users with fewer rights “could be less impacted than users who operate with administrative rights,” BeyondTrust counted the bug.

The vast majority of critical Microsoft vulnerabilities — 92 per cent of them — could have been mitigated by stripping users of administrative rights, said John Moyer, the CEO of BeyondTrust.

“This speaks to what enterprises should be doing,” Moyer said. “Clearly, eliminating administrative rights can close the window of opportunity of attack.”

Plugging the leaks

Closing the holes in a network

Of the 154 bugs published and patched by Microsoft in 2008, critical or not, 69 per cent would have been blocked or their impact reduced by configuring users to run without administrative rights, said the company.

When BeyondTrust looked at the vulnerabilities patched for Microsoft’s browser, Internet Explorer (IE), and its application suite, Office, it found that 89 per cent of the former and 94 per cent of the latter could have been stymied by denying users administrative privileges.

“We were surprised to see how large the number was,” said Scott McCarley , the company’s director of marketing. “It really drives home how critical a role [rights] play.”

Microsoft’s approach to user rights has been a matter of debate of late. Last week, a pair of bloggers posted proof-of-concept code that demonstrated how attackers could disable Windows 7’s revamped User Account Control (UAC).

UAC, a security feature that debuted in 2007 with Windows Vista, prompts users for their consent before Windows allows tasks such as program installations to continue.

“That proof-of-concept illustrates how important it is that users log in as a standard user, not as administrative users,” said McCarley. Only users running Windows with administrative rights are vulnerable to the attack.

Microsoft has refused to call the Windows 7 UAC issue a security bug, and instead has insisted that the behavior exploited by the malicious script is by design.

Computerworld

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now