Attackers are trying to take advantage of a newly disclosed vulnerability in several of Microsoft's server products that could allow them to run unauthorised code on affected computers, the company has warned.
The attacks are limited so far, according to a Microsoft advisory issued late last week. The company is working on a patch but no release date has been set, a spokeswoman in London said.
Microsoft just issued seven critical patches on Tuesday, its monthly patch day, and isn't due for another round until 8 May. The company did issue an emergency patch on 3 April for a dangerous animated cursor flaw, but it does not typically stray from its regular patch schedule.
The vulnerability lies in the in the domain name system (DNS) Server Service, which looks up numerical internet protocol (IP) addresses to allow a website to be called into a browser. The affected products are Windows 2000 Server Service Pack 4, and Windows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2.
The flaw can cause a stack-based buffer overrun in the DNS Server's remote procedure call (RPC) interface. RPC is a protocol through which a programme can request a service from an application on another machine on a network.
An attacker could try to exploit the problem by sending a special RPC packet to the system, which then could allow code to run in the "security context of the Domain Name System Server Service," Microsoft said.
Microsoft listed several ways to block an attack until a patch is issued. Administrators can disable RPC's remote management capability through the registry key settings, Microsoft said. The SANS Institute, which monitors the health of the internet and conducts security training, recommended this option.
Other workarounds include blocking ports 1024 to 5000 on the firewall, which are used by the RPC protocol, and enabling advanced TCP/IP filtering, Microsoft said.
Danish security vendor Secunia rated the problem as "highly critical" in an advisory.