Russian security company Positive Technologies has released a patch to a security hole it said it discovered in Microsoft's Windows XP Service Pack 2 last year.
We found two small flaws that a programmer could use to go around the SP2 mechanism Data Execution Protection [DEP]," says Positive Technologies Chief Technology Officer Yury Maximov.
As Microsoft explains on its Web site, DEP is a set of hardware and software technologies that perform additional checks on memory to help prevent malicious code from running on a system. According to Maximov, Positive Technologies informed the Redmond, Washington, software maker on December 22 about a problem with DEP and was told to wait for a response from the company.
"It has been over one month and we have not heard from Microsoft, so we decided to issue our own patch," Maximov says. "We understand that Microsoft wants to protect its product, but we feel it is more important for people to know about the problem and to know there is a tool to protect them."
Maximov adds that it was his understanding that hacker groups were already working on ways to exploit the holes in DEP so as to insert rogue code into a PC's memory.
Representatives from Microsoft could not immediately be reached for comment.
Patch Available
Positive Technologies, in Moscow, has developed a temporary security measure, which it made available last week as a free utility called PTmsHORP, Maximov says.
The security hole cannot be fully eliminated by a separate patch, according to Maximov, and Positive Technologies assumed that Microsoft was not going to publish the problem or issue a security fix before the release of Service Pack 3, he says.
But some analysts question the wisdom of downloading third-party patches. "Personally, I would not advise people installing such patches," says Ovum analyst Graham Titterington. "There is a lot of danger in installing patches from people or companies you're not absolutely sure of. Chances are there wouldn't be a problem, but that is a risk not worth taking."
When other companies make publicly known the security problems within Microsoft products such as SP2, it puts pressure on Microsoft to address the issue, Titterington says, but publishing third-party patches could possibly further the problem.
"I agree that not having heard from Microsoft for a month was slightly undesirable, but the response time for situations like this are usually more like three months," Titterington says.
The PTmsHORP utility is available online here:
http://www.maxpatrol.com/ptmshorp.asp