Windows Vista security 'rendered useless' by researchers

Windows Vista blown wide open:

LAS VEGAS -- Two security researchers have developed a new technique that essentially bypasses all of the memory protection safeguards in the Windows Vista operating system, an advance that many in the security community say will have far-reaching implications not only for Microsoft, but also on how the entire technology industry thinks about attacks.
Researchers who have read the paper that Dowd and Sotirov wrote on the techniques say their work is a major breakthrough and there is little that Microsoft can do to address the problems. The attacks themselves are not based on any new vulnerabilities in IE or Vista, but instead take advantage of Vista's fundamental architecture and the ways in which Microsoft chose to protect it.

"The genius of this is that it's completely reusable," said Dino Dai Zovi, a well-known security researcher and author. "They have attacks that let them load chosen content to a chosen location with chosen permissions. That's completely game over."
 
There wasn't much info in that article though to give a sense of what they did to work around it and what assumptions they are working on or if it could easily be fixed with an update.
 
There's also a big difference between "you visit my web page as ROOT" and "you visit my web page as a restricted user"
 
since we are talking about security if you go to any websites that show tv shows ect and you get a message saying you need a new version of flash to view content, be carefull there is a rogue flash installer going around it caught me out
 
It sounds like if you use something other than I.E., the exploit won't properly work. Or did I misunderstand the article?
 
Read the paper guys. The headline is pretty sensationalist IMHO.

http://taossa.com/archive/bh08sotirovdowd.pdf

Basically they've found techniques to bypass various buffer overflow, heap corruption, no-execute, randomization, and exception-chain protections built into Vista by taking advantage of browser plugins that aren't compiled properly or that contain security bugs.

Using these techniques allows you to exploit some security holes that were previously made unusable by these protections.

The basic observation IMHO is that since the OS and browser these days are getting pretty hardened against attacks, hackers are finding it fruitful to search popular 3rd party plugins (Quicktime, Flash, Java, .NET, etc) for vulnerabilities.

BTW these techniques would most likely work on any platform and browser that allows plugins like Java or Flash to run.
 
Last edited by a moderator:
So its a plugin hack?
Once the compromised plugin is installed, they can do what they want because the plugin is allowed to execute whatever code?

Would NoScript prevent it (assuming you have the scipt blocked)?
 
I've now read the paper (OK skipped the techy cody bits) & the issue as I understand it is indeed browser plugins like Flash/Java/.NET.
Not 'Vista now, maybe XP later' but 'definitely XP & to a lesser extent Vista too'.

Specifically:
  • Most plugins load automatically & start running code without questioning the user.
  • Some plugins may not be compiled to use OS level protection that needs to be opted-in at compile & so are vulnerable.
  • Plugins are not only able to execute code from the internet but ones like Flash/Java/.NET are designed/able to load code from the internet to executable memory & so bypass OS level security despite running in a 'sandbox'.

In summary: MS OS security OK, (Browser/OS handling of) plugins Bad.
 
Back
Top