Exploits Circulating for Latest Windows Holes 185
1sockchuck writes "Exploits are already circulating for at least two (and possibly four) of the Windows security holes addressed in Microsoft's updates on Tuesday. Several working exploits have been released for a new vulnerability in Windows Plug and Play technology, which could be used to spread a worm targeting Windows 2000 machines, according to eEye security, which has released a free scanner to help network admins identify vulnerable computers."
Microsoft Induced? (Score:5, Funny)
Re:Microsoft Induced? (Score:2)
Re:Microsoft Induced? (Score:1)
Re:Microsoft Induced? (Score:2)
Re:Microsoft Induced? (Score:2)
Re:Microsoft Induced? (Score:2)
Software license to install them: $0.00
Just giggling when folks complain about their 0wn3d Windows boxes: Priceless.
The better things in life are free. For everything else, there's Microsoft.
Only two or four... (Score:5, Funny)
Is it really New? (Score:5, Funny)
So isn't this just an old exploit that was just found?
See? Having 900,000,000,000 lines of code is a good thing.
Re:Is it really New? (Score:5, Interesting)
So isn't this just an old exploit that was just found?
No. This is an old vulnerability that was just published, and had new exploits written and published for it. That is not to say other exploits have not existed for this vulnerability for the last five years.
Re:Is it really New? (Score:2)
Just to amplify what you've said:
It's possible, and has a certain chance of being likely that this exploit has been published in non-public fora for the past five years.
As we learned a couple stories back, Microsoft is catching exploits of unpublished vulnerabilities in their honeypots. I'm
Re:Is it really New? (Score:2)
Well gosh, there's an authoritative statement.
Re:Is it really New? (Score:2)
Re:Is it really New? (Score:2)
Yes and no...
Re:Is it really New? (Score:2)
The "virus underground" is known to exist as a subculture that shares information about building viruses and kits.
There are plenty of cracks sites available, some of which take advantage of buffer overflows.
And there are plenty of phrack/2600/gfiles sites out there, plus all the IRC babble around them.
We know there are 'teams' of 'sploit writers who compete with each other (and often target and dismantle other tea
Re:Is it really New? (Score:2)
I love how "you people" make assumptions and form opinions without actually reading up on the subject and educating yourselves.
I love how people lambast others for their ignorance while demonstrating they don't even know what the terms being used mean.
This is a new vulnerability in a service that had a vulnerability years ago.
So you're saying that If I install Win2k from my old CD on a system and don't install the patches, I won't be vulnerable to this exploit? If so, you're wrong. This vulnerabili
Re:Is it really New? (Score:2, Funny)
This just goes to prove that hackers are getting as lazy. I mean it took them 5 years to find this hidden feature. Or maybe MS programmers have more forsight than we give them credit for.
Registration form privacy information at eEye (Score:5, Insightful)
Why do they insist on my personal information if they aren't going to use it?
They have the ability to let me opt out of of mailing, why don't they provide an opt out for my information in the first place?
Re:Registration form privacy information at eEye (Score:1, Informative)
Re:Registration form privacy information at eEye (Score:1)
Our website's registration forms require users to provide contact information (names and email addresses) and financial information (account or credit card numbers). Financial information that is collected is used to bill the user for products and services purchased and is only used internally by eEye. Contact information is used to confirm and ship orders, to contact the user when necessary, and to notify users when new products and services are available. Users may choose not to receive future mailings f
Re:Registration form privacy information at eEye (Score:2)
http://www.spamgourmet.com/ [spamgourmet.com]
Easiest (Score:2)
I'll also mention the bugmenot firefox extension since many others do, but personally I find it kind of useless. Beyond mega site like nytimes.com it doesnt' seem to work well. Anyway just figured it was worth mentioning.
Lip service to privacy (Score:2)
In similar vein, note that you have to fill in your email twice [eeye.com]. A classic example of why "double opt-in" is utterly meaningless.
Re:Registration form privacy information at eEye (Score:2)
What does the word affiliated mean in this context?
The privacy information says tat the information is never given to other thrid-party. It doesn't say that the the information cannot be sold.
It is interesting that... (Score:5, Insightful)
Re:It is interesting that... (Score:1)
Uh oh, the grammar nazis will decend upon ye shortly. I heard that phrase misused on CNN the other day, how the hell does that happen.
Re:It is interesting that... (Score:2)
By the way, it's spelled "descend". Also, your second sentence is a comma splice; in this case your comma could be replaced with a semicolon or a period. You also need a question mark after "how the hell does that happen", not a period.
Re:It is interesting that... (Score:3, Insightful)
exploits probably created from patches (Score:2)
I think it reinforces the idea that people create exploits by reverse engineering patches. MS was right on this one.
Re:exploits probably created from patches (Score:2)
Professional crackers do not release their exploits, they use them for profit. This may reinforce the idea that the second tier of crackers writes their exploits after shown how. Thus forcing Microsoft to do something.
MS was right on this one
You don't know that.
Re:It is interesting that... (Score:3, Insightful)
Let me give you some examples of exploits (ie worms) that came out after patches: Blaster, Sasser, Nimda (MS patched this 330 days before the worm actually hit). Code Red is the only one that immediately comes to mind as a worm that hit before the patch, and even in that case, MS didn't know ahead of time that IIS was exploitable. It was 0-day.
In the case of the Plug & Play exploit, it became common knowledge *because* of the patch, which was re
Re:It is interesting that... (Score:2)
Not any more, Poindexter. The definition has changed. Languages have a tendency to do that, just as pedants have a tendency to want to see their language cast in stone.
Re:It is interesting that... (Score:3, Insightful)
Evolution of language isn't a problem, but useless entropy like forgetting the meaning of an expression makes clear and effective writing more difficult. There are those of us who like to read clear and effective writing, so we wish
Re:It is interesting that... (Score:2)
I have personally resigned the phrase 'begs the question' to the trash heap of vulgar language, and unless I'm talking to a man of letters and not the general public, I don't use the phrase. It's 'more proper' usage is all but useless in the 'real world'
It's too bad, but such is life and language. The vulgar consistantly take words with precise and definate meanings and sully them. I guess what I'm saying is that to try to fight that kind of degredation is an exerc
Re:It is interesting that... (Score:1)
D'oh!
Re:It is interesting that... (Score:2)
Re:It is interesting that... (Score:2, Funny)
Like a little kid saying, "Do you like this, say yes?"
Begging, so that you'll know what you're supposed to say.
Re:It is interesting that... (Score:3, Informative)
http://skepdic.com/begging.html [skepdic.com]
http://www.randomhouse.com/wotd/index.pperl?date=
It's a form of circular reasoning.
Re:It is interesting that... (Score:2)
Not any more, Poindexter. The definition has changed. Languages have a tendency to do that
I suppose that you think "nukular" is now part of the language as well. Incorrect usage of debating terms merely marks you as someone who never learned about logic, and can't be bothered to pay attention to those who did. Try "invites" or "raises" next time.
I don't know exactly why... (Score:2, Funny)
"The worms crawl in, the worms crawl out
The worms play pinochle on your snout..."
Re:I don't know exactly why... (Score:2)
Did you ever think, as a hearse goes by,
That you might be the next to die?
They wrap you up in a big white sheet,
And bury you down about six feet deep
They put you in a big black box,
And cover you up with dirt and rocks,
And all goes well, for about a week,
And then the coffin begins to leak!
The worms crawl in, the worms crawl out,
The worms play pinochle on your snout.
They eat your eyes, they eat your nose,
They eat the jelly between your toes.
A great big worm with rolling eyes,
C
Re:I don't know exactly why... (Score:2)
Many more cool and disgusting verses to parents song.
Free, but not without pain (Score:3, Insightful)
Is anyone but me getting sick of these companies releasing "free" tools that require you to register for their incessant spam, phone calls, and other marketing harassment in order to download? Yes, I understand that they spent money to develop the tool, but what if I want to scan my home network? MySQL isn't too bad, at least. They have the marketing signup, should you be interested, but provide a link to download without all the crap.
[Wanders off muttering about the good old days of gopher and archie]Re:Free, but not without pain (Score:2)
Re:Free, but not without pain (Score:2)
link (Score:2, Informative)
-WH
Re:Free, but not without pain (Score:2)
Re:Free, but not without pain (Score:2)
Not to worry... (Score:1)
Re:Not to worry... (Score:3, Interesting)
As a programer myself I am often faced with the idea of completely re-writing my code, not just leaving the function sit, while being unused.
Compare to Apple's OS X (granted, the numbers argument about there is not a mass majority to spread a major virus even if it was to be discovered), why cant Microsoft decide to take shape,
Re:Not to worry... (Score:1)
Re:Not to worry... (Score:4, Interesting)
Re:Not to worry... (Score:2)
Maybe it is there, but I did not see any reference to UPnP, only PnP.
Re:Not to worry... (Score:2)
Don't misunderstand me, I'm not trying to bash Microsoft. Overall I beleive their product fills the need o
Why is this surprising? (Score:4, Interesting)
The recent article on the front page here (2 down at the moment), talks about vulnerabilities linked to MS05-038 being in the wild in mid July (actually quite a bit earlier, but we will give them the benefit of the doubt). There have been a number of minor exploits in existence for at least a month and a half with respect to some image handling capabilities through IE (also MS05-038).
Security-Protocols claimed to have discovered the vulnerability linked to MS05-041, and there were some minor claims that other people had been able to make it into exploits which weren't widespread.
I initially thought that the Plug and Play vulnerability was linked to a report on an overflow with respect to handling USB devices (which has also been reported), but it seems to be much worse.
I am fully aware of the reasons why companies EOL their software, but Microsoft's cessation of mainstream support for Win 2000 might be coming back to bite them, given that Win 2000 is just as vulnerable to these exploits as Win XP and 2003, if not more so.
Win2k still supported for security fixes (Score:2)
Source: http://support.microsoft.com/lifecycle/ [microsoft.com]
MS Support lifelines (Score:2)
I do know of the 5/10 year split for Microsoft products, but I also believe that there will still be a large number of organisations running Windows 2000, come 2010, and they won't be upgrading. It is like the current concern over Cisco's IOS. Yes, they have patched the vulnerability Mike Lynn used as his example (stealthily in the April update), but there will be a not-insignificant number of network devices that will never see this patch, or others that are needed to protect against the newly described
Aren't they always critical? (Score:1)
Unless I'm mis-reading this... (Score:5, Insightful)
If that's the case, what's the problem?
Re:Unless I'm mis-reading this... (Score:2)
Re:Unless I'm mis-reading this... (Score:2)
Re:Unless I'm mis-reading this... (Score:1)
Seems to me Microsoft almost always has a patch before the exploits go around.
I keep my system updated and turn on the firewall in XP, and I've never had a security issue with my machine.
Re:Unless I'm mis-reading this... (Score:1)
Re:Unless I'm mis-reading this... (Score:2)
These days, people run expensive (in both monetarily and computationally senses) "virus" scanners instead of updating their systems. Ideally, if you have an up-to-date system, there are no holes for worms to exploit, so you don't need worm protection. Right?
Re:Unless I'm mis-reading this... (Score:1)
Well, I'm sure some would argue that. But it's always been my philosophy, and it's always worked for me.
Re:Unless I'm mis-reading this... (Score:5, Insightful)
My rant is not against MS. It's against people (supposedly people with knowledge) don't take the time to update their systems. SP2 actually improved this by trying to push the updates in the user's throats.
Re:Unless I'm mis-reading this... (Score:2)
Until recently, they haven't really had to. They should have, but the zombie nets are relatively recent developments.
I wonder how many people burned out their Model T engines because they didn't understand they had to change the oil.
Re:Unless I'm mis-reading this... (Score:2)
How long ago do you consider recent? Zombie nets have been becoming increasingly problematic for at least the past 4 years... and that's just when I started being affected by them. At least it's slightly more difficult to infect machines now... in the good 'ol days, the zombie nets mostly spread by looking for win2k machines with a blank administrator password and open c$ share.
Re:Unless I'm mis-reading this... (Score:2)
Yeah, that's about right. It's a long time in the computer security field, but we're talking about something that needs to have an effect on societal behavior. From that perspective, 4 years is pretty short for something that, on the surface, risks neither life nor limb.
Re:Unless I'm mis-reading this... (Score:2)
Begin the Slashdot chant... (Score:1, Troll)
I can already hear the Slashdot chant of how security researchers have every right to release exploit code usable by script-kiddies whenever they want. I can't wait until the Internet culture is such that just because you can do something doesn't make it right.
Re:Begin the Slashdot chant... (Score:1)
I can take a gun and shoot someone now just because someone made a gund available to me, but that doesn't make it right. I can release an exploit to software to disrupt many peoples lives because someone told me how to do it, but that doesn't make it right.
Just because it's on t'interweb doesn't change the rules of morality and ethics, right and wrong.
Re:Begin the Slashdot chant... (Score:2)
Scanner? (Score:5, Funny)
What, the Windows startup screen wasn't sufficient to identify vulnerable computers?
Re:Scanner? (Score:2)
As many computer customers tell me, "I don't know how I got a virus, I run Scandisk and Defrag every week!"
In other news... (Score:2, Insightful)
http://www.mandriva.com/security/advisories?dis=10
But of course, that's not newsworthy because it doesn't involve hating Microsoft. This ain't a troll; it's an attempt to show that BOTH systems have pretty lame security track records, yet all we hear about is Windows.
Look at that list above. Given 300 million clueless users running that Mandrake instead of Windows, don't you think there'd be exploits for that plenthora of holes
Re:In other news... (Score:1)
Re:In other news... (Score:2, Insightful)
Of course, Windows doesn't come with the hundreds (thousands?) of applications that Mandriva does, and so it's a bit unfair to compare the Mandriva security advisory list (which includes fixes for MySQL, Apache, Perl, Mozilla, Vi, etc etc) to the Windows list.
Here's some news for you, chum. (Score:3, Informative)
Exploits circulate after bug report (Score:1)
However, it does make me suspicious of the dogma of some white hat hackers, that black hats may already know about vulnerabilities so there's no reason not to give full exposure.
Re:Exploits circulate after bug report (Score:2, Interesting)
I'm not saying that is the case with this particular exploit, but Microsoft wants everyone to believe that we wouldn't have to worry about exploits if those white hats would just
Re:Exploits circulate after bug report (Score:2)
nessus plugins available (Score:3, Informative)
Exploiting the Exploit (Score:2, Interesting)
I would recommend that users stop using slashdot.org as a way to distribute pointless software in an attempt to collect free user data.
steps ahead (Score:4, Funny)
Once again: (original at http://slashdot.org/comments.pl?sid=71367&cid=645
10) find big remote vulnerability in product
20) perfect the exploit
30) have fun with it for months
40) find another big hole in same product
50) perfect exploit for hole
60) alert vendor about original hole
70) have fun with new hole
80) goto 40
Let's Hear Ira Winkler Now (Score:3, Interesting)
He's been writing that Mike Lynn did the industry a disservice by revealing the buffer overflow class of Cisco vulnerabilities.
His logic is that as soon as you reveal a vulnerability, you accelerate the exploits, and therefore vulnerabilities should not be revealed. (In other words, the classic "security through obscurity argument.")
He seems to think it makes more work for him and other security people.
I pointed out to him that if we follow his logic, no vulnerability and no patch would ever be released. Here we have exploits following a patch. Does he now think Microsoft should not have released the advisory and patch because it "accelerated" the development of an exploit which will affect unpatched systems?
This is exactly his logic with Mike Lynn's actions. He claims revealing the buffer flaws, even though Cisco has patched the two actual flaws found, will cause an exploit to appear that will affect unpatched systems and cause him "more work."
I pointed out to him that he should thus blame Microsoft for patching the SQL Server flaws even though most admins didn't patch their servers in time for the worms that took advantage of them.
I also pointed out to him that if he thinks security is easy and he can't handle the "extra work" exploits cause, get out of the business.
His real motivation, of course, which I also pointed out to him, was simply sour grapes that he didn't get the press for revealing the flaws. The security business is very competitive, and every time a researcher announces something, everybody else denounces him as wrong, premature, or not following proper "protocol." All this just to keep THEIR names - and by extension, the same vulnerabilities they're complaining about - in the trade press. It's hypocritical.
Re: (Score:2)
And HERE it is.... (Score:2)
http://www.frsirt.com/exploits/20050811.MS05-039.c .php [frsirt.com]
Re:Well give and take credit from Microsoft (Score:3, Insightful)
Microsoft's biggest problem really is all th
Re:Well give and take credit from Microsoft (Score:2)
I believe MS is discontinuing patch support for Win2k
Re:Well give and take credit from Microsoft (Score:2)
So - what other software company is still patching eight-year old OS? Sun? IBM? SCO? Novell? Apple?
Your question is not quite fair. The relevant question is what OS's are eight years old, and have no published security vulnerabilities for which you cannot easily acquire a fix?
Looking at this from the point of view of a customer, I want to buy an OS and in eight years I want it to still be usable and secure and I preferably want it to be that way at no extra cost. I'm planning on running this platform l
Re:And Linux doesen't?!?!? (Score:2, Informative)
if you want long term support, buy something that has it.
Re:Just Upgrade (Score:1)
Maybe not for one machine, but how about for 500, 1,000, or 10,000?
Re:Just Upgrade (Score:3, Insightful)
Re:Just Upgrade (Score:1)
Re:Just Upgrade (Score:2, Insightful)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re:Why I love Microsoft problems! (Score:2)