Windows Vulnerabilities Revealed, Patched 445
Saint Aardvark writes "A big MS Windows remote vulnerability has just hit BugTraq. It concerns a buffer overflow in MS' DCOM, and affects Win2k through Server 2003; here's the security advisory from Microsoft. This is in addition to an earlier vulnerability concerning conversion from HTML to RTF - there's a separate security advisory from Microsoft for this one, and it affects Win98 and NT 4.0 through Server 2003. Patch early, patch often." There's also a CNET News story with a little more explanation on the newest vulnerability.
*G* (Score:5, Funny)
heh (Score:5, Funny)
Re:heh (Score:2, Insightful)
A system is as secure as the patches applied to it.
Re:heh (Score:5, Informative)
It's important to note that the system account is god in Windows -- even Administrator has less power than system.
Re:heh (Score:4, Insightful)
Re:heh (Score:3, Insightful)
There have been 0 linux security advisories in the last week. The advisories you mention are in software that can run under Linux. If you're going to count all software that runs under Linux as a Linux vulnerability, then by extension you have to include all software that runs under Windows as a Windows vulnerability.
The reason this is a big issue isn't because it's a whole in a Microsoft product, it's because it's a whole in the core operating system. Note that /. is also making a big deal of the IOS v
Re:heh (Score:3, Funny)
Re:heh (Score:3, Interesting)
Re:heh (Score:2)
I'm an evil demon that tricks programmers into not bounds checking.
Re:heh (Score:4, Informative)
Don't Worry (Score:3, Funny)
-Lux
Re:heh (Score:3, Insightful)
While I can sympathize with your situation of living in mortal fear of updating your software (such is life when using microsoft products), Please please please lock your machine up behind a firewall of some sort (software firewalls don't count.) While you've got nothing of importance on your machine, You have an IP address and the ability to send spam or othe
Bugs in software != Cruddy software (Score:5, Insightful)
Yes, this is /.
Yes, hardly anyone here likes MS and people here love to bash MS whenever they can.
That's fine with me. But almost all software has bugs, and in particular bugs that could be exploited to breach the security of the program. Just because MS has a bug in the RPC code doesn't mean that no one should use their software, or in particular the federal gov't should not.
If this same criterion were required of any software the gov't bought, they would have NO software. Linux is not bug free. Software written for Linux is not bug free. The main difference is, Windows is a much bigger target of attack by every hacker and "security group" in the world because it is the most popular operating system in the world. How would any Linux distribution fare if it and its components were used as widely as Windows, and people spent hours every day _trying_ to pass garbage strings of data to all of its external functions in order to find a buffer overrun? I bet it wouldn't do so hot either, and even if it didn't, that doesn't mean that no one should by that Linux distribution, does it?
PROGRAMS HAVE BUGS. And the more complex the programs, the more they interact with other components, often in ways the original programmers never thought of _or intended_, the more likely bugs will be found. My opinion is, taking cheap shots at MS is easy, but writing good code yourself is hard. We're all human beings here, and the developers who work on Linux and open source programs are no smarter than most who work at MS. People make mistakes. Sometimes people don't think about every possible bogus string parameter someone could pass in just to screw up their program. Most of the time the bugs I find in my and other's code is from components trying to _correctly_ use our code!
Flamebait, troll, whatever. Just because you don't like MS for all the /. reasons doesn't justify what you say.
Peace,
Devin
Re:Bugs in software != Cruddy software (Score:5, Insightful)
You're missing the point.
Microsoft has been bragging up their Trustworthy Computing [sic] and talking about how much better their efforts have been then open source projects. Meanwhile OpenBSD (for example) has had a much, much better security record.
If you brag about your secure code, yet continue to have ridiculous security holes, the technical community should have every right to call you on your unjustified haughtiness! There still appear to be systemic problems with Windows that won't be fixed in a year or two no matter how arrogant Microsoft is.
Where do you want to patch today?
-Kevin
Re:Bugs in software != Cruddy software (Score:5, Insightful)
And the truly funny part is that when the rubber hits the road, it's still the Same Old Microsoft.
The bugs aren't in the software. THEY'RE IN THE CORPORATE CULTURE OF THIS PARTICULAR VENDOR.
Shit, look at today's hole - a cut-and-paste operation could 0wnz0r j00r b0x0r? Go ahead and secure your box if you like, but...
This is a security advisory? What the fuck? What the fucking fuck fuck?
(Shit, if they put that on the "cut-and-paste 0wnz j00, disable Javashit for a quick fix" page, I'm surprised they didn't put something like "Note that firewalling port 135 could cost you rich functionality and notifications of products and services in which you might be interested" on the remotely-exploitable SYSTEM hole.)
The mindset that values "rich functionality" over basic sane design is why MSFT is unfit to secure Steve Ballmer's head outside of his own ass, let alone HomeSec's b0x3n. That mindset starts at the top, and works its way down to every developer, even the poor motherfucker who has to write up the TechNet web pages on the weekly critical 'sploits. THAT MINDSET is the bug that needs to be fixed before MS crapware can even begin to fantasize about trustworthiness.
(/me goes back to pounding head on desk, repeating "WTFFF", over and over again.)
"WTFFF" - A New Mantra for a New Age of Trustworthy Computing.
Re:Bugs in software != Cruddy software (Score:3, Insightful)
slightly offtopic I know, and I don't mean to pick on your post but it always amuses (and amazes) me that the computer industry gets away with this programs-are-complicated-so-they're-
Re:Bugs in software != Cruddy software (Score:3, Insightful)
Excellent point, and one of the biggest problems with Windows. Why is the HTML converter a component of the *operating system*? Why can a web site give someone access to the system if I'm using Internet Explorer? The more "functionality" they pile into Windows, the more points of access there are to the system, and the
Re: yes... hmmmmmm.. (Score:4, Interesting)
Conviently... (Score:3, Insightful)
Re:Conviently... (Score:5, Funny)
Yeah, like it's a big secret that microsoft products are insecure... come on, it's not like they're stupid and/or oblivious at the department of Homeland Security, are they...?
More info and POC ... (Score:5, Informative)
Here [lsd-pl.net] is the report from the people who found the vulnerabilities (or at least one of them) which includes a proof-of-concept paper [lsd-pl.net] and code [lsd-pl.net].
Re:More info and POC ... (Score:4, Funny)
That's how these security rollups work, right?
Re:More info and POC ... (Score:4, Informative)
Re:More info and POC ... (Score:2, Informative)
winnuke all over again! (Score:5, Interesting)
Sounds like we'll haev winnuke2003 sometime soon.
<disclaimer>I know that winnuke uses OOB data vs this which does something on the application layer.
Re:winnuke all over again! (Score:2)
patch beat slashdot (Score:4, Interesting)
Re:patch beat slashdot (Score:5, Insightful)
It's somewhat funny though that in a closed-source system how people are still finding vulnerabilities. Can you imagine how many vulnerabilities would be found in the first day of Microsoft releasing their source code to the world? I think the number would be staggering.
Re:patch beat slashdot (Score:2, Insightful)
That's a paradox of almost Terminatoresque proportions!
"It's somewhat funny though that in a closed-source system how people are still finding vulnerabilities. Can you imagine how many vulnerabilities would be found in the first day of Microsoft releasing their source code to the world? I think the number would be staggering."
I would always expect there to be more bugs in closed source code, simply because only a l
Re:patch beat slashdot (Score:4, Funny)
shame on you!
now go to slashdot.org and practice hitting that 'refresh' button
Re:patch beat slashdot (Score:2, Insightful)
Would you trust a company that obviously hides the truth about the very foundation of your computer software base?
Re:patch beat slashdot (Score:4, Insightful)
Re:patch beat slashdot (Score:2, Insightful)
This is opposite of what some closed source companies want to happen to them. They want to be the ONLY ones notified and then they will announce that it was fixed. Personally I think that they should be notified the same time that that the news media are notified so that people who are up on the security issues c
Playing that game (Score:5, Insightful)
Knowing about a problem even if no solution exists allows you to take measures, like perhaps blocking outside access on certain ports for some time or filtering traffic in specific ways.
Information always beats no information when you are trying to keep something secure.
Re:patch beat slashdot (Score:4, Funny)
Ever consider that large portions of the Slashdot readership possibly have no need for the patch?
Re:patch beat slashdot (Score:3, Interesting)
For critical security updates, don't rely on the automatic update tools yet.
Re:patch beat slashdot (Score:4, Interesting)
Bad (Score:5, Insightful)
Re:Bad (Score:5, Insightful)
Consider the usual : A Windows client on the internal network is infected with a virus that may exploit this buffer overflow. Since port 135 is not firewalled on the internal network, your Windows servers are hacked. And the rest is history.
In addition we have all those home Windows boxes connected direct to the Internet with no firewall/virus-detection. Another playground has been opened for script kiddies.
Re:Bad (Score:2)
Unless you're really smart: put all the Windows users inside the DMZ.
Re:Bad (Score:5, Funny)
Most network admins are too portly and would sheer CAT-5 cable. Better to use Fiber-Optic cable. It has a higher tensile strength.
Bad One? (Score:5, Insightful)
Re:Bad One? (Score:2, Informative)
Re:Bad One? (Score:5, Interesting)
Would you want your business to rely on it? I find it utterly astounding that so many PHB's still think its a good idea. A German beaurocrat who was pitching open source insightfully quipped, "'Security through obscurity' is the model of yesterday. The model of the future is 'Security through transparency'". Thats a paraphrase, and I'm too lazy to look it up. Great point, though. Maybe this new vulnerability will lead to another "slammer" worm...
Poll: Tinfoil hat mode ON! (Score:4, Funny)
Re:Poll: Tinfoil hat mode ON! (Score:5, Insightful)
Probably similar reasons as to why Linux-contributors release patches so often.
Because software has bugs. That's what software is for.
Re:Poll: Tinfoil hat mode ON! (Score:5, Funny)
Hmm, and all this time I thought software was for doing work, silly me!
Re:Poll: Tinfoil hat mode ON! (Score:4, Insightful)
Re:Poll: Tinfoil hat mode ON! (Score:2)
Re:Poll: Tinfoil hat mode ON! (Score:2, Insightful)
33 patches and counting since March 31.
http://www.microsoft.com/technet/treeview/defau
18 patches and counting since March 31.
Nobody's immune. Even the BSD distros send out the occasional notice.
Re:Poll: Tinfoil hat mode ON! (Score:5, Insightful)
Could not check the MS one but I am guessing more than 3 of them were OS level patches since there were three just today.
Every one has security vulnerabilities but lets compare apples to apples here.
Re:Poll: Tinfoil hat mode ON! (Score:3, Insightful)
Re:Poll: Tinfoil hat mode ON! (Score:5, Informative)
Actually it is comparing correctly because of the way the different systems are architected.
Apache is usually run in userland with limited privledges on a Unix machine while IIS.sys is a kernel mode device driver on a Windows machine. There result is a compromise in IIS presents a system wide security issue while a similar security issue in Apache only represents a user level security issue.
This sort of thing is very common in comparing Windows vs Unix/Linux security. The Windows code runs with admin level access or as part of the kernel, while the Linux application runs with much more restricted access.
Re:Poll: Tinfoil hat mode ON! (Score:3, Insightful)
You are correct, but when was the last time you heard someone refer to a Mozilla bug as a Linux bug? If there is a bug in IE, it is usually considered a windows bug (even ones where you must be actively running and surfing with IE).
Choices... (Score:4, Insightful)
Ok. As soon as You show me how to remove IE from Windows altogether as I can do with Mozilla on a Linux box I'll agree with You.
A bug in IE is a windows bug since there is no way to remove IE (I don't cound win98lite) while a bug in Mozilla is a bug in Mozilla.
Choices You know...
Re:Poll: Tinfoil hat mode ON! (Score:3, Insightful)
Seriously, because:
1) University Grad students think that Microsoft security problems are good Thesis topics.
2) It is the most prevalent OS on desktop machines, so it gets more attention.
3) Unlike other software vendors, they actually fix issues and distribute the patches instead of forcing customers to sign a NDA to get the known flaw in their enterprise class machine fixed (SUN).
4) They create complex software to provide the user with a better experience, but c
Dupe (Score:5, Funny)
Last Stage of Delirium Research Group (Score:3, Informative)
Re:Last Stage of Delirium Research Group (Score:2)
To be more of the topic, why the hell do people love it so much to put links that "Go back to the top of the page"? Tell the users to press "Home" damnit!
Technet article (Score:2, Informative)
nt4 (Score:3, Insightful)
i know i'm not the only greyhat who smiled when they heard of the patching-stop [slashdot.org] for NT4
aaaah, the joys of an nonsupported, yet still heavily used platform
happy cracking y'all
Re:nt4 (Score:5, Informative)
I would patch (Score:2, Interesting)
Re:I would patch (Score:3, Insightful)
Are you sure these 'patches' you are applying weren't annoymously sent to you in an e-mail message? You know the mail message, where every sentance has a gramatical error in it ("I give you these patches in hopes that we protect your system together"), and the From line simply says "Microsoft Support People".
Then I could believe you got spyware from a patch. But otherwise, you're just full of FUD.
-Malakai
An apropos blast from the past (Score:4, Informative)
Sent: Tuesday, January 15, 2002 5:22 PM
To: Microsoft and Subsidiaries: All FTE
Subject: Trustworthy computing
They are right to attribute such great importance to trustworthy systems -- and I do believe they are trying -- but 30,000,000 lines of code necessarily lead to opaque semantics. Good luck, MS, I think this will be one of many such deficiencies in Server 2003. Repeated claims of security and "trustworthiness" from their higher-ups will place the company in a boy-who-cried-wolf marketing scenario; at that point they're up a creek.
Re:An apropos blast from the past (Score:3, Interesting)
Here we go again (Score:2)
Re:Here we go again (Score:2, Interesting)
The motivation behind Trustworthy Computing is all about Digital Rights Management and copyright enforcement - it has little to do with fixing the seemingly infinite number of buffer overflow vulnerabilities that lead to total system compromise in Micro$soft's operating systems.
Here's some links about it [www.lifl.fr] if you want more information.
Re:Here we go again (Score:2)
What do you know... (Score:5, Funny)
Vulnerability (Score:4, Funny)
Turnaround time...? (Score:5, Interesting)
Re:Turnaround time...? (Score:3, Insightful)
Oh, you mean the turnaround time until it is *discovered* and the patch.
I guess the point is, with open-source software such as Linux, the chance of big gaping security holes hanging around for years is much less. People look in the code and get them fixed up fairly quickly. This hole had been in Windows for years, and thus virtually every Windows server on the pl
Re:Turnaround time...? (Score:5, Insightful)
Not a troll, just figure I'd point out that this cuts both ways.
Having said that, Linux beats Windows hands down in my books, for one big reason: I don't even know how to close port 135 on a Windows machine, without killing other services. AFAIK the RPC service is pretty much tied up together, and many applications won't work without it.
Stock Linux install leaves maybe 2 ports open.. oh wait, 0 if you let IPtables do its thing. In Windows, I'm still busy playing whack-a-mole trying to close the 15 or so ports XP insists on listening on.
Or maybe it's easy in Windows, and I've just given up learning how to lock a machine down with every release. Anyone ever figure out how to *permanently* close those idiotic admin shares?
Correct (Score:5, Insightful)
When you must expose software to an infinently unknown amount of combinations (of OS, software, hardware but most important user input), you just cannot gaurentee that there will be no unexpected results. The biggest problem is the vairablity of user input. People will try and use things in unexpected, unapproved and malicious ways. Well, when this happens, it is possable an unforseen problem will crop up, despite your best efforts to prevent it.
What I find funny is how outraged people get about this in the computer world, when it is so prevliant elsewhere, with much higher stakes. For example: It is a known flaw with basically every consumer automibile that high speed impacts will result in sever injury or death of the operator. Now, this is an unintended method of operation, you are't SUPPOSED to slam into a brick wall doing 80, but it is a KNOWN problem, and remains un fixed. Further, they could fix, or at least improve, the problem in a large way. The first step would be to install an 8-point racing harness. Those little shoulder strap belts just don't cut it, you need to belt yourself in tighter and have more points of contact to dissapate the force over a larger area. Then there is the car itself. It needs a much better frame and much better break away points, as seen in race cars. Finally, there is other safety gear such as a helmet. Well, as race cars demonstrate, these do work. They make extremely high speed collisons, generally with only minor injuries to the driver.
So, why don't we have this? Two big reasons: Cost and inconvenience. Building a car to race car specs is EXPENSIVE, and not just because teh engine is high performance. That frame is NOT cheap. Then there are other safety measues that are a huge pain in the ass. An 8-point harness is an ordeal to get in and out of and noone want to wear a helmet inside a car. Thus, we consider it acceptable to allow the flaw to exist since it is one resultant of behavious that should not happen.
This is also akin to the computer siutation in that we could drasticly increase reliablity, but only by sacraficing cost and convienece. The cost would come form needing a verified design. Thing would move slowly because each part would need to eb extensively tested to insure there were no problems. This appiles to hardware and software. Kiss $1000 computer goodbye and figure on $10,000 or up. Then there is the inconvienence. They can't have you fiddling with this verified design, so you are going to be able to run only the apps tey ahve preapproved on the hardware they preapprove.
Unless you are willing to accept that (and people do make systems like that, contact IBM) then unforseen bugs and exploits WILL happen. And please don't act like it doesn't happen to OSS, go read SANS or Security Focus some time. There are more than plenty of exploits for both closed and open software.
Trustworthy Homeland (Score:2)
We now need on ensure that our homeland is trustworthy. Whether that means full disclosure and a decrease in FUD, I don't know. (political implications intended)
As for operating systems and security vulnerabilities, holding back information regarding possible security threats until they're fixed (knowingly exposing systems in the meantime) DEFINITELY
hah! (Score:5, Funny)
all you people who said i was stupid for running windows me, look who's laughing now!
WTF? (Score:4, Interesting)
No Borg icon? No wise cracks? What gives?
Re: WTF? (Score:2, Funny)
> No Borg icon? No wise cracks? What gives?
The cracks are in the software; don't know about the other stuff.
one step ahead (Score:5, Funny)
20) perfect the exploit
30) have fun with it for months
40) find another big hole in same product
50) perfect exploit for hole
60) alert vendor about original hole
70) have fun with new hole
80) goto 40
Windows Vulnerabilities Revealed, Patched (Score:4, Funny)
Jonathan Frakes explores the seedy world of Windows Vulneralbilities, on Windows Vulnerabilities Revealed, Patched!
Tonight on Fox!
and this is news? (Score:2)
This is very surprising (Score:3, Funny)
Aren't we being just a little hypocritical here? (Score:3, Insightful)
Yes, I run Windows! (Score:2, Funny)
*hides*
Re:Yes, I run Windows! (Score:5, Funny)
Sure. (Score:5, Funny)
Hell, even legitimate users of Windows ME can't take control of their computers...
Windows Update (Score:5, Funny)
Security Update for Windows XP (823980)
Download size: 1.2 MB, ~ 1 minute
A security issue has been identified that could allow an attacker to remotely compromise a computer running Microsoft® Windows® and gain complete control over it. You can help protect your computer by installing this update from Microsoft. After you install this item, you may have to restart your computer.
Unchecked Buffer in Windows Shell Could Enable System Compromise
821557: Security Update (Windows XP)
Download size: 5.1 MB, ~ 1 minute
An identified security issue in Microsoft Windows could allow an attacker to compromise a Microsoft Windows-based system and then take a variety of actions. For example, an attacker could execute code on the system. By installing this update, you can help protect your computer. After you install this item, you may have to restart your computer.
Could someone get them a copy of Secure Programming and highlight all of chapter 6 Avoid Buffer Overflow.
Didnt take long... (Score:5, Informative)
Ugh, isn't the net fun?
Buffer Overruns - this sounds familiar (Score:4, Interesting)
"It was primarily a process issue," he said. "We will be updating our automated scanning tool to make sure this type of issue is detected in the future."
Last week, there were two patches released - both termed "buffer overruns". Nice semantics, because it's not made clear whether one could call this a buffer overflow, or an UNDERflow. It was just two weeks ago when the details about getting Linux to run on the XBox were released, and how the buffer underflow trick was used. Makes me wonder if MS took notice of that trick, and is now busy scanning the rest of their code looking for underflows, as opposed to the overflows they've already had their automated tools earmarking?
Yet another SCAM ? (Score:4, Funny)
"The announcement came one day after the Department of Homeland Security announced that it awarded a five-year, $90-million contract for Microsoft to supply all its most important desktop and server software for about 140,000 computers inside the new federal agency."
http://www.sfgate.com/cgi-bin/article.cgi?file=/ne ws/archive/2003/07/16/national1725EDT0732.DTL
that last quote is on the bottom..
Robert
Time to patch Windows, must be Thursday (Score:3, Funny)
I had my Outlook Calendar set to sync on the Windows patches, now tomorrow's schedule will be all messed up. I wonder if I can convince my boss that tomorrow is really Friday?
Ahhhh, This explains it (Score:5, Informative)
So, it may be very possible this sploit has been around for some time now.
We replaced Windows server long ago (Score:3, Insightful)
We replaced it and are quite happy now. We don't pay anything for our new OS, and I go away for months and nothing bad happens
One Of These Things Is Not Like The Other... (Score:3, Insightful)
Re:someting is wrong with this picture (Score:2, Funny)
5) PROFIT
Re:OH NO! Not Windows 2003!? (Score:2)
Not that there can't be 2k&2k3 admins who patch frequently, but there's sure a lot more of em who just don't care or don't have time, whatever.
Re:OH NO! Not Windows 2003!? (Score:2)
Is this bit'o'news overblown? Probably. Will a lot of /.s generate a bunch of banner ad hits posting a lot of noise over it? Definately. But your example does not compare apples to apples.
Re:Well that's better than... (Score:2)
Well, I'll assume they are, seeing as you are OBVIOUSLY not a kernel developer yourself and yet you seem to be talking about those very contents...
Re:port 135 um... (Score:2)