Microsoft Corp. has alerted users to a problem in Windows Firewall that could be exploited by attackers as part of a broader system infection. The problem means that Windows Firewall can be made to hide certain information from the user, Microsoft said.
The bug isn't itself a vulnerability, Microsoft insisted in an advisory last week, since it can't be used to invade a system. It is, rather, an "unexpected behavior" that an attacker could use to cover up malicious activity, Microsoft said.
The company issued a patch for the problem, available only to authenticated Windows users.
The flaw is in the way Windows Firewall displays exception entries, created by administrators to allow incoming network connections. If an exception is created in the Registry, it won't be displayed in the Windows Firewall user interface, meaning users might not be able to spot the exception entry.
It's unlikely that such a Registry entry would be created under ordinary circumstances, and a user couldn't create one without administrator privileges, Microsoft said. "It is more likely that an attacker who has already compromised the system would create such malformed registry entries with intent to confuse a user," Microsoft said in the advisory.
The patch fixes the issue, and Microsoft also released a workaround, found in a the relevant Knowledge Base entry. Microsoft also noted that the problem doesn't affect command line firewall administration tools.
Though the flaw could conceivably be of use to attackers, Microsoft said the problem wasn't security related. "Although this is not a security vulnerability, this non-security update was issued to provide users a way to display malformed Windows Firewall configuration registry entries," the company said in the Knowledge Base article.
Windows XP Service Pack 2 (SP2) is credited with making Windows much more secure, but months after the update's rollout, significant cracks have started to appear. One of the biggest flaw disclosures came from Finjan Software late last year, which claimed to have discovered a set of 10 major security flaws in SP2, bypassing many of the security measures the update puts into place.
The patch is at http://www.microsoft.com/downloads/details.aspx?familyid=478FD24B-B2C4-4207-B1B9-1C988698C888&displaylang=en
The advisory is at http://www.microsoft.com/technet/security/advisory/897663.mspx