When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

Experts: Don't blame Microsoft for mass site defacements

Progress was made Monday in mitigating thousands of SQL-based Web sites injected with malicious javascript code. However, one security expert says we can expect more such attacks in the near future. A traditional SQL injection attack allows malicious attackers to execute commands on an application's database by injecting executable code. "What's different about this latest attack is the size and the level of sophistication," said Jeremiah Grossman, CTO of White Hat Security.

On Friday, Microsoft denied that new vulnerabilities within Internet Information Services are to blame for a rash of Web site defacements. Microsoft insists it's the application developer's responsibility to follow the company's best practices. These include constraining and sanitizing input data, using type-safe SQL parameters for data access, and restricting account permissions in the database.

Grossman agreed it's not Microsoft's fault, and said the attacks could have easily targeted another vendor's software. If users surf to an SQL-injected site, their browser will attempt to download a variety of exploits, not all of which are Microsoft-based. One site from the Shadowserver Foundation lists exploits affecting Real and other vendors alongside various Microsoft Security bulletins.

View: Full Article @ CNet News.com

Report a problem with article
Next Article

18 Features Windows Should Have (but doesn't)

Previous Article

i'm Initiative donates $1.3M in its first year.

Join the conversation!

Login or Sign Up to read and post a comment.

3 Comments - Add comment