Security researchers took 2 hours to reverse engineer yesterdays release of a critical patch for the Windows operating system.
According to The New York Times, developers of the Immunity security testing tool wrote an exploit after Microsoft released a patch for the issue yesterday. Immnuity's tool is available to paying customers to test their systems against exploit code.
Hackers and security researchers regularly reverse engineer patches after Microsoft release them in an effort to get workable exploit code.
In a statement yesterday Microsoft feared the vulnerability "could be used in the crafting of a wormable exploit". If exploited, the vulnerability would allow an attacker to take complete control of the computer and affect other machines on the network in worm-like fashion.
The flaw lies in the Windows Server service, used to connect different network resources such as file and print servers over a network.
Microsoft has urged customers to download the update direct from Microsoft.