Windows Patch Tuesday Hole Being Used in Zero-Day Attacks

Just one day after Microsoft released its monthly security patch, attackers had already reverse-engineered one of the bulletins and have been using it in active attacks.

According to security training firm SANS Institute, bulletin MS15-034, which resolved an issue in Windows and how it receives HTTP requests (but was not seen in the wild being used in active exploits), had been spotted in its honeypot monitoring to be used in targeted attacks against Web servers.

"The problem is that this will easily crash systems," said SANS Internet Storm Center CTO Johannes Ullrich. "It is not a denial of service, and not easily a data leakage issue like Heartbleed. But even crashing millions of IIS servers could cause significant impact, as many large sites use IIS."

System crashes can occur when the Range header in an HTTP request is manipulated to a variable that is too high for a server to handle, causing a Windows kernel crash. The flaw can be found in Windows 7, 8, 8.1, Windows Server 2008 R2, Windows Server 2012 and Windows Server 2012 R2, which all run Internet Information Services (IIS) for Windows.

SANS Institute has also shared information on how to easily check a IIS server to see if it is vulnerable in a security bulletin. Send the following request through IIS for Windows:

GET  / HTTP/1.1
Host: MS15034
Range: bytes=0-18446744073709551615

"If the server responds with 'Requested Header Range Not Satisfiable,' then you may be vulnerable," wrote SANS Institute.

The easiest solution is to apply the fix released on Tuesday as soon as possible. Furthermore, if more testing of April's patch is needed before applying it, Microsoft said a workaround is available if the IIS kernel caching is disabled. However, the company warns that performance issues may occur by doing this.  


About the Author

Chris Paoli is the site producer for and


  • How To Replace an Aging Domain Controller

    If the hardware behind your domain controllers has become outdated, here's a step-by-step guide to performing a hardware refresh.

  • Azure Backup for SQL Server 2008 Available at Preview Stage

    Microsoft added the option of using the Azure Backup service to provide recovery support for SQL Server 2008 and SQL Server 2008 R2 when those workloads are hosted on Azure virtual machines.

  • Microsoft Suggests Disabling Old Protocols with Exchange Server 2019

    Exchange Server 2019 with Cumulative Update 2 (CU2) can help organizations rid themselves of old authentication protocols, which constitute a potential security risk.

  • Microsoft Previews New Edge Browser on Windows 7 and Windows 8.1

    Microsoft announced this week that it has released previews of its Chromium-based Microsoft Edge Web browsers for use on Windows 7, Windows 8 and Windows 8.1 systems.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.