Windows exploit code recently released into the wild is causing confusion in the security world, as it seems to overlap with a critical bug Microsoft patched last month.Contrary to appearances, however, Microsoft has said the proof-of-concept code exploits a previously undiscovered flaw that just happens to be in the same component as one patched by last month’s MS06-035 update.That means Microsoft didn’t slip up in creating its patch; on the other hand, Microsoft confirmed that the bug is exploitable and has not been patched. The bug affects a fully patched Windows XP with SP2, as well as various versions of Windows Server 2003 and Windows 2000.A user going by the handle “cocoruder” released the exploit code on the milw0rm.com website last month, shortly after MS06-035 was published. Adrian Stone, a program manager with the Microsoft Security Response Center (MSRC), said the exploit code had triggered speculation that MS06-035 hadn’t completely fixed a critical flaw in the Server driver (srv.sys).“While this appears to have been found after the release of MS06-035, this does not affect the same code path or functionality or vulnerability that was addressed by the update,” Stone wrote in an MSRC alert on Friday. He said that while MS06-035 fixed a serious flaw that could allow an attacker to take over a system, the newer bug is less serious, resulting in a denial of service. “At this time we have not identified any possibilities with this issue that could allow remote code execution,” he wrote. Microsoft isn’t aware of attacks using the flaw, and is working on a fix, he said.Researchers from Internet Security Systems X-Force pinpointed the bug after an analysis of the exploit code, the company said in a Friday advisory. “Attackers can reliably cause Microsoft Windows to blue screen,” X-Force stated in the advisory. “Users must reboot to recover from the crash. An exploit is available in the wild. As of this writing, no patch is available for the vulnerability.”The bug is due to a null pointer dereference in srv.sys. Remote attackers can shut down affected Windows systems by sending a specially crafted network packet, X-Force said.X-Force and Microsoft agreed that the original workarounds detailed in MS06-035 would also work for the new bug—specifically, restricting traffic to ports 135-139 and 445.-Matthew Broersma, Techworld.com (London)This article is posted on our Microsoft Informer page. For more news on the Redmond, Wash.-based powerhouse, keep checking in. Check out our CIO News Alerts and Tech Informer pages for more updated news coverage. Related content brandpost Sponsored by Freshworks When your AI chatbots mess up AI ‘hallucinations’ present significant business risks, but new types of guardrails can keep them from doing serious damage By Paul Gillin Dec 08, 2023 4 mins Generative AI brandpost Sponsored by Dell New research: How IT leaders drive business benefits by accelerating device refresh strategies Security leaders have particular concerns that older devices are more vulnerable to increasingly sophisticated cyber attacks. By Laura McEwan Dec 08, 2023 3 mins Infrastructure Management case study Toyota transforms IT service desk with gen AI To help promote insourcing and quality control, Toyota Motor North America is leveraging generative AI for HR and IT service desk requests. By Thor Olavsrud Dec 08, 2023 7 mins Employee Experience Generative AI ICT Partners feature CSM certification: Costs, requirements, and all you need to know The Certified ScrumMaster (CSM) certification sets the standard for establishing Scrum theory, developing practical applications and rules, and leading teams and stakeholders through the development process. By Moira Alexander Dec 08, 2023 8 mins Certifications IT Skills Project Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe