Microsoft patched a hole in its .Net Passport identity management service last night after a security researcher disclosed a potentially serious flaw that could enable attackers to hijack Passport accounts.Microsoft patched a hole in its .Net Passport identity management service last night after a security researcher disclosed a potentially serious flaw that could enable attackers to hijack Passport accounts.The vulnerability was in the code for a “Secret Question” feature that helped users who had forgotten their Passport password, according to a message posted by Victor Manuel Alvarez Castro, who identified himself as a security consultant.Some Passport accounts that were created before the Secret Question feature was implemented in August 1999 contained “bad data” in the Secret Question field, according to Jeff Jones, senior director of Trustworthy Computing Security at Microsoft. That data enabled knowledgeable attackers to circumvent the Secret Question feature and reset the password for another Passport user’s account, he said.Attackers needed to know both the e-mail address and home country of the account owner. In the case of U.S.-based accounts, an attacker also needed the state and zip code of the account owner, Jones said. Microsoft would not comment on how many Passport user accounts were affected, but Jones characterized the number as a “small fraction” of the subset of accounts that were created before August 1999 for which no secret question had been established.After verifying the problem Monday, Microsoft temporarily suspended the password update feature that relied on the Secret Question for all its Passport users, Jones said.Microsoft patched the errant code Monday evening so that the bad data could not be used to circumvent the Secret Question requirement, then updated the Passport service overnight, Jones said.Microsoft does not have any evidence that the vulnerability was exploited, Jones said.Customers whose Passport accounts were affected by the problem should still be able to log in to the service. Those individuals can overwrite the bad data by setting up a valid Secret Question, Jones said.Customers can also use an e-mail-based update feature to update their password, he said. The company did not receive any word from Castro prior to the public disclosure and first learned of the flaw when it was posted to software security newsgroups, he said.Microsoft encourages security researchers to report problems to Microsoft before disclosing them to the public, Jones said.“We try to develop relationships with professionals out there and encourage responsible reporting. I don’t know this guy, but he didn’t follow responsible reporting rules,” he said. Related content how-to Doing tricks on the Linux command line Linux tricks can make even the more complicated Linux commands easier, more fun and more rewarding. By Sandra Henry-Stocker Dec 08, 2023 5 mins Linux news TSMC bets on AI chips for revival of growth in semiconductor demand Executives at the chip manufacturer are still optimistic about the revenue potential of AI, as Nvidia and its partners say new GPUs have a lead time of up to 52 weeks. By Sam Reynolds Dec 08, 2023 3 mins CPUs and Processors Technology Industry news End of road for VMware’s end-user computing and security units: Broadcom Broadcom is refocusing VMWare on creating private and hybrid cloud environments for large enterprises and divesting its non-core assets. By Sam Reynolds Dec 08, 2023 3 mins Mergers and Acquisitions news analysis IBM cloud service aims to deliver secure, multicloud connectivity IBM Hybrid Cloud Mesh is a multicloud networking service that includes IT discovery, security, monitoring and traffic-engineering capabilities. By Michael Cooney Dec 07, 2023 3 mins Network Security Cloud Computing Networking Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe