Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security Bug Microsoft

Microsoft Admits XP Has Same Bug As Win2K 161

Arashtamere sends in a Computerworld story on a security flaw in the Windows 2000 pseudo-random number generator published by Israeli researchers earlier this month. Microsoft has now admitted that the flaw is present in XP too. Microsoft denies that the bug is a security vulnerability, since an attacker would have to have gained administrative access to a system before exploiting it. (The Israeli researchers point out that many common exploits provide admin access.) This stance apparently lets them off the hook for patching Win2K, which is in "extended support" mode, though it powers about 9% of US and EU business computers. Microsoft said that XP SP3, due in the first half of next year, will fix the bug. The company said that Vista, Windows Server 2003 SP2, and the new Windows Server 2008 are not vulnerable.
This discussion has been archived. No new comments can be posted.

Microsoft Admits XP Has Same Bug As Win2K

Comments Filter:
  • by guy-in-corner ( 614138 ) on Thursday November 22, 2007 @12:41PM (#21446705)

    Especially when it's something this easy to fix.

    It might be easy to code the fix, but it's (at least) an order of magnitude more work to actually test it. Windows supports thousands of different hardware configurations, in hundreds of different languages.

    Yeah, Microsoft could release this as a hotfix. For any customer that screams loud enough (and pays enough), they may well do.

    To be honest, I'd rather see Microsoft focus their efforts on XP SP3, Vista SP1 and 2008 RTM (2003 SP2 only just came out, so I'll let that slide). I can't say that I'm fussed about seeing Windows 2000 SP5, and I'm sure that the vast majority of Microsoft's customers aren't either.

    On a personal note, I'm fed up with supporting Windows 2000 (it's 7 years old, for FSM's sake!), so I've gotta come down on Microsoft's side on this one.

  • Re:stupid (Score:4, Informative)

    by Anonymous Coward on Thursday November 22, 2007 @01:14PM (#21446975)
    Because you own a machine _now_ doesnt give you access to the encryption keys that was generated in the past.

    This PRNG vulnurability does just that. Keys derived from it can be recovered by an attacker who compromises the machine _after_ the key was used and discarded.
  • by DrYak ( 748999 ) on Thursday November 22, 2007 @01:16PM (#21446981) Homepage
    Meanwhile, free/libre open-source unices like Linux and *BSD have been having a sound random generator [wikipedia.org] that doesn't suck too much [seclists.org] for, like, ages...

    No, sorry, you can keep Vista for yourself.
  • by fatphil ( 181876 ) on Thursday November 22, 2007 @01:16PM (#21446987) Homepage
    One concrete weakness of this attack is that it permits you to reverse-engineer "secure" sessions _before_ you got admin privilege, as the random number generator can be 'rewound'.

    So-called forward security (yes, looking at things in the past is 'forward' :-) ) is an important trait, and MS's scheme is missing it.
  • by Anonymous Coward on Thursday November 22, 2007 @01:22PM (#21447029)
    The Linux RNG was vulnerable in the past too. What was your point?
  • by ajs318 ( 655362 ) <sd_resp2@earthsh ... .co.uk minus bsd> on Thursday November 22, 2007 @02:10PM (#21447367)
    And your "random"-number generator, unless based on a proven algorithm, might well have vulnerabilities of its own to worry about. If you keep the source code secret, no serious security person is going to touch it with a barge pole; and if you show the source code, then your extra layer is largely irrelevant since the sequence only depends on a seed supplied by Microsoft's PRNG.

    The nub of the problem is that a deterministic state machine can never produce random behaviour. The long term solution would be an entropy generator on the motherboard. (Actually, many machines have one already: a sound card with an unconnected high-impedance input picking up static is a good entropy source.)
  • Re:stupid (Score:3, Informative)

    by lgw ( 121541 ) on Thursday November 22, 2007 @02:19PM (#21447421) Journal

    Because you own a machine _now_ doesnt give you access to the encryption keys that was generated in the past.
    Except that it pretty much does for Windows NTFS encryption. Thank you "key recovery account". For that matter, on a Windows machine not in a domain with default settings, you can get the NTFS encryption keys with no accounts at all, just stick the drive in your machine and "recover" the keys with the local admin account. Checkbox feature for the win!

    And if you're using real encryption instead, you're not caring about the Windows RNG I hope.
  • by trifish ( 826353 ) on Thursday November 22, 2007 @02:49PM (#21447679)
    Yes, the Linux random number generator was vulnerable in the past too. See e.g. http://eprint.iacr.org/2006/086.pdf [iacr.org]
  • by Schraegstrichpunkt ( 931443 ) on Thursday November 22, 2007 @08:41PM (#21449995) Homepage

    CryptGenRandom is supposed to be the Windows-equivalent of /dev/urandom. Except it's not, because of this design flaw. The implications of this extend far beyond encrypted NTFS volumes.

    For example, an attacker can passively monitor a network of Windows machines, wait for one of them to do something interesting (like connect via SSL www.paypal.com), then actively compromise those selected machines later, and gain enough information to decrypt the captured SSL sessions.

    Basically, if you encrypt something sensitive, before some spyware gets installed on your Windows machine---or after it's removed---the random data used for the encryption (including stuff like SSH session keys) is likely to be compromised (except perhaps in cases where you've rebooted or restarted the requisite processes in the meantime).

    Do not underestimate the severity of this bug.

"May your future be limited only by your dreams." -- Christa McAuliffe

Working...