MS Mulling Changes to Thwart .ANI-type Attacks 99
Scada Moosh writes "ZDNet has a story about the lessons Microsoft learned from the recent animated cursor (.ani) attacks and some of the broad changes being made to flag this type of vulnerability ahead of time. The changes include a possible addition to the list of banned API function calls, more aggressive checks for buffer overruns and enhancements to existing fuzz testing tools. '[Michael] Howard said Microsoft will "rethink the heuristics" used by the /GS compiler to flag certain issues. "Changing the compiler is a long-term task. In the short-term, we have a new compiler pragma that forces the compiler to be much more aggressive, and we will start using this pragma on new code," he added. Two other Windows Vista security mechanisms -- ASLR and SafeSEH -- were also in place to catch code failures but, in the case of the .ani bug, Howard said the attackers were able to wrap vulnerable code in an exception handler to find ways around those mitigations.'"
Re:Maybe... (Score:4, Funny)
Re: (Score:2)
Re: (Score:2, Troll)
Thanks, I'm not half as organized with my Slashdoting as you are!
Re: (Score:1, Troll)
I can't see anything in that article that would stop that exact same attack working on Linux.
Go ahead and make one then. I'm sure Mr. Gates would promise to pay you well and then stab you in the back, but you would have proved your point.
Re: (Score:1)
Not even if you called it FREE XXX SLUTZ NOW.JPG.exe.
Channel stuffing. 2007 is the year of Linux. (Score:1, Troll)
An AC pest taunts,
By the way twitter, how do you feel about how "M$" enjoyed a 60% jump in revenue on Vista and new office sales in the last quarter? Looks like Vista is doing well!
They stuffed their channels and I don't expect the next quarter to look very good. Studies that show that only one in ten people are planning to use Vista better and that a large percentage of businesses never plan to move to Vista are more in tune with reality. The fact that M$ has not and will not fix their security model
Re: (Score:2)
You will never know. (Score:1, Troll)
so what you are telling me here is that if I allow my operating system to be compromised, it will be compromised?
Yes, but there will be no trace of it on your hard drive, anti-virus writers don't check BIOS, so you will never know people are logging into your system and taking what they want. Ha ha.
But no, what your AC sock puppets have claimed is not true - this won't work on gnu/linux. It only works for Vista by exploiting M$ specific flaws. Those flaws were originally designed to lock you out of y
Re: (Score:2)
Re: (Score:2)
But no, what your AC sock puppets have claimed is not true - this won't work on gnu/linux. It only works for Vista by exploiting M$ specific flaws. Those flaws were originally designed to lock you out of your kernel and it looks like they have done exactly that.
Umm, no. Rootkits existed for Windows long before Vista and kernel patch protection. Rootkits exist for Linux. Rootkits exist for MacOS. Newsflash: if you compromise a system at the kernel level, your system is -- wait for it -- compromised. Obviously.
Show me the gnu/linux demonstration and I might believe you.
Google is your friend. A quick Google gives: SucKIT, Rial, heroin, afhrm, Synapsis, adore, knark, itf, kis as some exanples. That's almost certainly not a comprehensive list, and I've no idea whether it's current. And, of course I'm certainly not say
Re: (Score:2)
http://nostarch.com/download/rootkits_ch2.pdf [nostarch.com]
All I have to do is send you a TAR file with an already chmod'ed ELF binary and get you to unpack it and run it. And why not? Windows users do that all the time. Heck, they get infected by executables in password-protected ZIP files, even after Winzip and Windows ask them TWICE whether they want to run it or not. And Outlook by default won't even let them open it.
But maybe when all those people switch to "GNU/Linux" they'll autom
Takeaway message: Non Free is Stagnant. (Score:2)
Nothing is new with the Vista security model. Check out boot kits [theregister.co.uk]
So while M$ contemplates fixing ancient flaws, the virus writers have discovered brand new ways to 0wn Windoze. Great, they are running circles around them.
Look at what they did to Twitter [slashdot.org]. I count no fewer than 10 modpoints blowing him off the discussion within 12 hours. He must have struck a nerve.
Re: (Score:2)
MODS: Sockpuppet alert! (Score:2)
Erris is Twitter's sockpuppet account. [slashdot.org]
What is a banned API call? (Score:5, Interesting)
Re: (Score:2)
Re:What is a banned API call? (Score:4, Informative)
It's all kinds of sexy... but basically, it removes functions in which programmers have frequently used incorrect or for which there is no absolutely correct way to use them and still validate user supplied data.
Re: (Score:2)
Re: (Score:3, Informative)
Microsoft's build tools will treat any calls to banned APIs [microsoft.com] as errors. They aren't removed from the system because they are used by many existing applications. For example, both strcpy and strncpy are banned at Microsoft. Yet many people have been using strncpy as a replacement for strcpy, so it needs to b
Re: (Score:2)
Kind of makes you wonder why there are so many buffer overflows in Windows, doesn't it?
Re: (Score:3, Funny)
If only Microsoft would add a C++lippy to MSVC to clear up these kinds of things.
Re: (Score:1)
Re: (Score:2)
You appear to be writing a buffer overflow. Would you like to:
1. Switch to a certified safe string copy function?
2. Cause Vista to pop up a security dialog every time your function is run?
3. See more information on currently unpatched Windows exploits?
4. See tips on how to acquire fame and fortune as a virus writer?
Re: (Score:2)
Re: (Score:1)
Don't balme the compiler (Score:1)
Default deny policy (Score:3, Insightful)
While risking being out of sync with Slashdot's schizophrenic stance on Microsoft-bashing, let me lower my hammer on this one:
"The changes include a possible addition to the list of banned API function calls"
That's exactly the problem with security under Windows! (okay, there are other problems as well)
Microsoft needs to apply a "default deny" policy to all aspects of Windows' security and this sort of thing wouldn't be a problem in the first place. There shouldn't be a list of BANNED calls, there should be a list of safe ALLOWED calls.
I'm not saying that other operating systems couldn't do a better job too, but security is one (huge) area where Microsoft really and truly sucks - and it isn't something they can solve overnight, either. It seems ingrained in their philosophy and permeates all aspects of Windows (and other products).
Re: (Score:2)
Unfortunately for Microsoft, they have a hell of a lot of that sort of code in Windows and a lot of their products. The ones they've really re-engineered like IIS6 or written fro
Re: (Score:2)
There shouldn't be a list of BANNED calls, there should be a list of safe ALLOWED calls.
I think this is similar to the GCC concept of hiding symbols. The only real issue is when compiling legacy code which links directly to those hidden symbols, linking will fail. Obviously, that's the point. I think, then, that the Microsoft approach is lazy: they're more worried about "legitimate" legacy code no longer working well with later compilers than they are about actually hiding the offending API calls from userspace all together.
Re: (Score:2)
It's the PC heritage, going back to the days when no-one in the non-Unix PC world gave the slightest thought to security, because you could get away with it back then. It's a difficult mindset to change, beca
No, it's a M$ thing. (Score:1, Troll)
It's the PC heritage, going back to the days when no-one in the non-Unix PC world gave the slightest thought to security, because you could get away with it back then.
They did not get away with it. Macro viruses blew out computer labs and people's systems and caused all manner of havoc.
Worse, M$ knew better and everyone told them so. They had Xenix, they helped make OS/2, they knew what they were doing, they just decided to hold on their DOS legacy. It was then and still is a matter of negligence. O
Re: (Score:2)
Re: (Score:1)
Default deny is a nice idea, but I haven't yet seen an implementation that doesn't require an expensive verisign certificate (MS signed drivers), a PhD in computer science (SELinux), or making the user click "Accept" until his mouse hand curls up into a raptor claw (Vista UAC)...
Re: (Score:1)
And MS doesnt sign the cert, or make any decision about who can or cannot get one. They simply created one trusted root, gave signing-certs to 8 or 10 cert-vendor companies, who then will sell you a cert that is signed from a trusted root.
It's theoretically possible for MS to revoke any given cert signed fr
Re: (Score:2)
"Allow or deny?"
Windows security is a sad joke. Unfortunately few people realize that.
Re: (Score:2)
("What triggers a UAC prompt" [edbott.com]
Related news (Score:5, Funny)
In context (Score:2)
Incremental approach. (Score:4, Insightful)
This incremental approach will eventually result in operating systems that are secure to all but the most sophisticated local attacks. You can't stop the attack where someone just downloads something and blindly runs it. Unlike most people, I don't think computer OS's and apps will always be as insecure as they have been for the last 15 years since the explosion of the Internet to the masses.
It may take another 5 years, but I think we're getting there. Vista isn't perfect, but it's a step closer.
Re:Incremental approach. NOT ANY SAFER (Score:2)
And since those attacks are For Sale for $3000 to $5000 on the Internet, everyone with intent to do serious, widespread damage will still be using them.
Re: (Score:2)
I thought I remembered a specific Solaris telnet exploit [slashdot.org] not too long ago that was incredible oversight by Sun. I guess that must have really been a Microsoft telnet daemon?
So? (Score:2)
I thought I remembered a specific Solaris telnet exploit not too long ago that was incredible oversight by Sun.
You win! I give up and admit the equality of Solaris and Windoze security models. Swarms of Sun powered bots will soon take down the internet.
Re: (Score:2)
Fortunately people like you who are incapable of adapting to new technology and get emotional about operating systems get weeded out. Face it, brother, you're a dinosaur.
For starters.... (Score:3, Insightful)
Wait, sounds familiar (Score:2)
You know if Bill Gates was any kind of leader, he would call for his programmers to scrutinize their code for these kinds of security issues. Oh wait! He did 5 years ago. [usatoday.com] It's great to know that MS has spent the last 5 years innovating such features.
Use non-overflowing buffers, heaps etc. (Score:2)
In this day and age of OOP and libraries, there's no excuse but negligence for crappy code.
Re: (Score:1)
Windows - be careful! (Score:3, Funny)
What Microsoft REALLY Needs To Do... (Score:3, Insightful)
Microsoft made a big to-do about "focusing on security" in the development of Windows Vista, but instead spent all this time A) spackling over the screwball security holes that the superfluous bits of the last version of the operating system created, and B) bolting on more superfluous bullshit.
The pattern of flagrant Windows/Microsoft security breaches has traditionally involved the fracal-like fuzz of superfluous features surrounding Windows. It simply tries to be too much. How many times have we heard about some hole in Internet Explorer that lets l33t h4xx0rs walk in and screw with your OS? Animated cursors opening security holes. ET-phone-home Windows Media player opening security holes. IIS subsystems on home user's computers opening security holes... Ad infinitum.
You want a web browser on your PC? Install a web browser. It shouldn't be your OS'es job. You want animated cursors? Install a cursor manager. It shouldn't be the OS'es job. You want media players? Install a media player. It shouldn't be the OS'es job. Are we seeing the fucking pattern here, yet? If Microsoft could focus on the core of the operating system, making it the platform and the framework that the rest of your computing experience happens on instead of trying to make it the damn "multimedia/computing experience" itself I'll wager a significant portion of these stupid, smack-on-the-forehead sort of problems would go away. And if and when they did crop up, users affected could just patch or uninstall the affected browser/media player/cursor manager/whatever instead of having it permanently tied into their OS for the rest of time (heaven forbid, for example, users reinstalling Windows into it's stock, unpatched state).
Re: (Score:1)
Re: (Score:2)
However, a key piece to overall system stability is integration testing. Debian does TONS of integration testing. Hence, stable is stable. The problem with leaving the integration testing to the user is that you turn a simple "poke-me" appliance into one of those annoying machines that geeks are always tinkering with. T
Re: (Score:2)
Re: (Score:2)
Innaccurate Summary (Score:3, Insightful)
Howard said that the vulnerable code happened to be wrapped in a very general try/catch block.
This try/catch block, which was in the vulnerable code already, and not injected by the attackers, potentially allowed the attackers to repeatedly try different memory locations looking for system call addresses that were randomized by ASLR.
Without this try/catch, the process would have crashed after the first failed attempt.
In other words, liberal try/catch policies can potentially expose security vulnerabilities by giving bad guys more than one chance to do their bad deeds.
Also, there were no reported instances of Vista being compromised. It is doubtful that the engineers of the various exploits targeted Vista, and therefor didn't take advantage of the try/catch issue to overcome ASLR since XP doesn't have ASLR. In addition, Protected Mode IE would have thwarted the attack even if they had.
But I Thought... (Score:3, Interesting)
So what did they do here? Rewrite the .ANI handler by re-implementing the same bug as before?
Or were we just lied to again, by Microsoft?
Re:But I Thought... (Score:5, Informative)
I guess it's easy to be mad at Microsoft for lying when you put those lies in their mouth yourself.
When have they stopped saying that kind of thing? (Score:1, Troll)
When did Microsoft ever claim to have rewritten Windows from scratch?
They used to do it regularly. NT stood for "New Technology." I can't tell you how many times they declared the "death of DOS" even while they were using the same old 16 bit functions. ME, W2K and XP were all billed as radically new but were all more of the same rehashes.
Vista is more of the same. The wikipedia entry, which they pay people to write, claims, "hundreds of new features; some of the most significant include an updated
Re:When have they stopped saying that kind of thin (Score:3, Insightful)
NT 3.0 was written from scratch. Please provide proof to the contrary, if you have it. Then, provide proof that *Microsoft* has claimed Vista is rewritten from scratch. And I said Vista, not Longhorn or anything else.
I'd calculate that about the same number of times you've declared "M$ Winblows" was "dead".
But I could be wrong.
Please provide proo
Re: (Score:2)
The wikipedia entry, which they pay people to write, claims, "hundreds of new features; some of the most significant include an updated graphical user interface and visual style dubbed Windows Aero, improved searching features, new multimedia creation tools such as Windows DVD Maker, and completely redesigned networking, audio, print, and display sub-systems." In short new everything, which clearly is not true
Ummm, no. You seem to have a serious misconception about what exactly an operating system is. Multimedia features, searching features, even networking, audio print etc. subsystems do not an OS make. The kernal is still the NT kernel -- with some changes, but still broadly the same -- which is why Vista is NT 6.0. No-one at Microsoft has ever claimed otherwise; no Wikipedia editor has ever claimed otherwise.
Re: (Score:2)
Both of them lead the reader to believe that Vista, has replaced everything of importance to the user.
I've just had a look at the Wikipedia pages again. They list, in quite some detail, exactly what has been changed and what is new, both on the surface [wikipedia.org] and underneath [wikipedia.org]. Is there anything there (most notably in the latter page, which describes the kernel & core OS changes) that you believe to be false? If so, and you have evidence, change the page and cite it, it is a Wiki. Even if there's just something on the page that you think goes beyond the remit of the sources there, raise it in the talk page o
Proof (Score:2)
Re: (Score:3, Informative)
Re: (Score:2)
The Vista reset was caused by a flawed attempt to include too many features at once combined with unsustainable development practices / management. It had absolutely nothing to do with
Furthermore, there was never a plan to rewrite Windows from the ground up.
Informative, indeed.
Re: (Score:2)
Re: (Score:3, Informative)
Many of the compatibility problems are related to fixing bugs in the OS. Any time you change the behavior of the operating system you risk breaking some piece of code that relied on the old behavior. Notice tha
Compiler issue? (Score:2)
Did Microsoft's new focus on security from the ground up with Vista really just amount to compiling all its system components with
Re: (Score:1)
It's not, but some compilers have options to add bounds checking in the compiled output. Usually this is done for testing then the code is compiled for release without the bounds checking. Also, there are tools like Purify [ibm.com] that also can do bounds checking and the like.
Sorry. (Score:1)
Security broke dragging files to cmd.exe (Score:5, Interesting)
In NT, console windows are actually owned by the most privileged user-mode process in the system, csrss.exe. One of Vista's big security changes is that processes cannot send window messages to windows owned by processes of higher security clearance. This means that Explorer cannot send a message to console windows telling them that there is a file being dragged to it. Starting Explorer as Administrator does not help, because csrss.exe runs with higher privilege than that.
Rather than fix the insane design issue of csrss.exe owning console windows, they decided to leave it the way it is. Never mind that there have been exploits against csrss.exe through the console system in the past.
To give you an idea of how bad of a hack the console implementation is, kernel32.dll's WriteFile detects console handles, which are fake handles, and translates the call into an RPC call to csrss.exe. This breaks all kinds of stuff.
Re: (Score:1)
I agree that cmd.exe is clunky. In Vista you can no longer put it in full screen either. Win+R, cmd.exe, alt+enter, alt+enter was an excellent way of resetting the video driver whenever it fucks up.
The problem with MS seems to be that they overlook 'worse case scenarios'. Shell extensions are nice, for instance, but how do you remove a faulty one? What do you do when the Add/Remove panel crashes or when the video card decides 2048x1600@85Hz is a nice display mode on your 1280@60Hz display?
On Linux the ans
backwards (Score:2, Interesting)
Another pointless discussion that doesn't acknowledge the depth of complexity of backwards compatability, and its commercial necessity.
Easy fix (Score:2)
Instead of fixing the underlying problem, MS tries hard to "fix" the world around it. It's not an issue with the compiler, it's not an issue with API calls that can be "abused", it's an issue with badly written API functions. Grab the source of those friggin' libs and move the structures that you moronically created