By:


Date:
Apr 16, 2015

Protect Your Windows Servers Against Critical HTTP.sys Vulnerability

Codero wants to urgently let you know that a new critical Windows vulnerability affecting 70 million+ websites hosted on Windows servers has been discovered. Microsoft has deemed this a critical security update for all supported editions of Windows. If you are running any affected version of Windows, you are vulnerable to a remote code execution attack until you install the updates and reboot your servers.

This vulnerability can affect both Codero Cloud and Codero’s Dedicated Server users. Here’s what you need to do to protect your infrastructure.

  • Codero Proactive Managed Clients: We’ve got you covered. You don’t need to do anything. We pro-actively made sure your servers were patched, secure and up-to-date. Rest assured: we won’t restart or interrupt any of your systems or services without telling you first.
  • Codero Essential Managed Clients: Since you manage your infrastructure yourself, it’s critical to update your system if your server is running one of the following versions of Windows:
    • Windows 7
    • Windows Server 2008 R2
    • Windows 8
    • Windows 8.1
    • Windows Server 2012
    • Windows Server 2012 R2

The easiest way to install the update (on all affected versions) is to execute the following commands: Start->Windows Update, check for updates and install.

Then you’ll need to reboot your server for the changes to take effect. You might realize this reboot is taking a bit longer. DON’T PANIC. Windows has to update files before it loads the OS, and it may have to reboot again for these changes to take effect.

What is This Vulnerability in Detail?

The vulnerability can be found within Microsoft’s HTTP protocol stack, known as HTTP.sys, and can allow remote code execution if an attacker sends a specific HTTP request to an affected Windows system.

Microsoft’s security update resolves the vulnerability by modifying how the Windows HTTP stack handles requests.

For more information, see the Affected Software section in Microsoft’s security bulletin. Full details of the update are published on Microsoft’s support site knowledge base.

If you have any additional questions on how to protect your Windows server from attacks, Codero’s world-class U.S.-based support is available 24/7/365 through ticket, chat and phone.

Share on FacebookTweet about this on TwitterShare on Google+Share on LinkedIn