Microsoft fixes its fix for DigiNotar certificates
Connecting state and local government leaders
Microsoft re-released Security Advisory (2607712) yesterday to replace a previous flawed update that failed to include all blocked Web certificates from a Dutch certificate authority firm.
Microsoft has issued an updated security advisory (2607712) that blocks Secure Sockets Layer certificates issued by a Dutch company that was hacked in July. The new release fixes a previous update that had failed to include all blocked certificates from the company, DigiNotar.
"Before September 19, 2011, the versions of update 2616676 for Windows XP and for Windows Server 2003 contained only the latest six digital certificates cross-signed by GTE and Entrust," Microsoft wrote in the Security Advisory. "These versions of the update did not contain the digital certificates that were included in update 2607712 or 2524375."
The recent update, which fixes the Security Advisory that was previously issued last Tuesday, revokes an additional 11 DigiNotar root certificates by placing them into Microsoft's Untrusted Certificate Store.
DigiNotar, the official digital certificate authority for the Netherlands, recently admitted that its servers were hacked in July and that it had issued a fraudulent Google digital certificate that was used to spy on 300,000 Gmail users in Iran.
Microsoft, along with Google and Mozilla, had started denying all digital certificates from Dutch certificate authority firm DigiNotar earlier this month. DigiNotar also drew a vote of no confidence by the Dutch government.
"We recognize this issue as an industry problem, and we have been actively collaborating with certificate authorities, governments, and software vendors to help protect our mutual customers," Microsoft wrote in last week's Security Advisory. "We continue to investigate this issue, and will update this blog as new information becomes available."
The update, which should be applied for Windows XP and Windows Server 2003 users, helps to block a vulnerability that "could be used to spoof content, perform phishing attacks, or perform man-in-the-middle attacks against all Web browser users including users of Internet Explorer."
According to Microsoft, all releases of Vista, Windows 7, Windows Server 2008 and Windows Server 2008 R2 are not affected by this issue and do not need the update.
Microsoft also advises that the update will require a restart before being applied.