MS Plans Emergency Update to Fix .ANI Bug 109
A feed from The Reg says"Widespread exploitation of an unpatched Windows vulnerability involving cursor animation files over the weekend have prompted Microsoft to announce plans to release an out-of-sequence patch on Tuesday MS plans emergency update to fix blinking cursor bug."
I'm glad ... (Score:1, Funny)
Re:I'm glad ... (Score:5, Funny)
Not to worry. He later hooks up with a certain senator, becomes a dark sith lord, and eventually becomes the right-hand man of the ruler of the known galaxy. It's only later when his son comes around to finding him that he gets killed.
Oh, wait...
Oh great! (Score:2, Funny)
WOW (Score:2, Insightful)
I'm still worried... (Score:3, Funny)
Re: (Score:2)
possible workaround (Score:1, Interesting)
Re:possible workaround (Score:5, Interesting)
Yes, but not quite the way you say - you'd want to override the cursor on all elements.
The CSS override would be fairly simple:
That overrides the cursor on all elements. The !important is important - the user-specified stylesheet is by default overridden by local pages. However, pages can't override !important rules in the user stylesheet.
However, I have not checked to make sure that using that stylesheet will actually prevent IE from downloading the cursor. For all I know it will still attempt to download the cursor anyway and still be vulnerable.
It *DOES* download it anyway (Score:5, Informative)
Well, I've had the chance to test it now. Internet Explorer (well, version 6, at least) in fact does download the ANI file anyway even when it's been overridden. I'm guessing it in fact downloads all related CSS resources even if they're never used.
Unfortunately I can't test if IE is actually vulnerable with the stylesheet in place because I'm behind a firewall that prevents me from getting any of the proof-of-concept files. So if someone else wants to test it, let me know.
Re: (Score:2)
No (Score:4, Informative)
What sends shivers up my spine is that I have a jpeg here that seems to work the same way. Now, how likely is it that a jpeg gets loaded in IE? I have that gut feeling that the WMF trojan storm of last year was a gentle breeze compared to this.
I have a hunch that this could maybe be the reason why MS is in such a hurry to fix this. And, while I rarely agree with them, I consider this extremely urgent as well. But only because I know now stronger word than urgent.
Re: (Score:2)
Thanks for the link! I've been trying to find a detailed report on the vulnerability since it was first announced. That was exactly what I needed to know!
I'd comment if... (Score:5, Funny)
Re: (Score:2, Funny)
Get rid of patch Tuesday (Score:5, Insightful)
Re: (Score:2)
Re: (Score:3, Insightful)
Wrong. They think it's not a big deal. But it is. It has been shown, without any surprise to security-conscious people, that there were bots and spamming-bots at several Fortune 500 companies. No matter how many anti-virus and firewall you've got, you're not detecting root-exploit hiding in Windows' kernel and communicating by hiding into seemingly regular http/htt
Re: (Score:3, Insightful)
There is little question a Windows administrator costs less than an experienced unix'er (a monkey can push a couple buttons and create a new user, but using adduser takes at least two working neurons), but the real question is if you want to trust your company's information to somewhat trained monkeys.
Why should I patch (Score:1, Funny)
Re: (Score:1, Insightful)
Re: (Score:2)
Re: (Score:2)
Don't complain now... Microsoft has known about this since December of last year - who knows how long the black hats have been using it?
I'm upset because I am responsible for users running Windows, and although I have set policy forbidding the usage of IE, I can't enforce it because of Microsoft tying the browser to the OS. I can't imagine the fits CIO's at bigger firms are having right now, and even more so at financial institutions (e.g. Wells Fargo), and then what if you were managing the network for s
Re: (Score:1)
You can still remove I.E. the program while leaving the I.E. rendering engine installed for patching (through I.E. tabs in mozilla or whatnot) without having any real downside effects (programs depending on I.E. still run as they don't use iexplore.exe) I've been doing this for years with XPlite, but you can just as e
Re: (Score:2)
Do you have any idea the diruption caused by patch deployments even on a monthly cycle? Particularly when reboots are involved?
I realize this is due to bad design on Microsoft's part... but at least with a monthly, predictable cycle I can work with the business to schedule downtime. That's where "Patch Tuesday" comes in.
I also realize that managed patching is the way to go... no matter the release cycle. However, we still end up with the same p
then YOU can make your own patch Tuesday (Score:2)
Some would rather not delay. They're not getting THEIR choice.
Remember, if Microsoft releases a patch every 30 minutes, you can still choose one day per month to apply them all.
i wonder what kid released the poc and away we go! (Score:1, Interesting)
for windows XP or what not. then a loser or three use this code
to arm their worms. remember, the worm is written many times over,
they just wait for 0day. they do not code anything, but cut and
paste.
who and where is the code? lets thank them for their hard work
Re:i wonder what kid released the poc and away we (Score:2)
This ain't some VB code that you copy, paste and alter. We're talking hand crafted assembler injection code here which does differ a lot from application to application. Just because you have a sample tha
Re: (Score:2)
The 'art' of squeezing your code into the package and pointing the instruction pointer into it is indeed the 'only' difficulty after the exploit has been published. This is indeed not hard when you know what you're doing, but then, what is?
If you REALLY know what you're doing, mentioning that there's a overflow flaw
Timing (Score:1)
Re: (Score:2)
Perhaps M$ should.... (Score:5, Informative)
Re:Perhaps M$ should.... (Score:4, Funny)
Patch Tuesday is wonderful. That means I can get up Wednesday morning, boot up my wife's PC and not have to deal with "Honey, what's the flashing little shield for again?". And before you ask, yep, it's going to Ubuntu pretty soon. Just got her on Firefox ("where is the blue E thingy now? How come it works different? Did you break the computer again?").
The good news? She now knows what a BSOD is - although I'm saddened to report that it is likely some annoying little hardware problem rather than being a Windows issue per se. Time for the screwdrivers...
Re:Perhaps M$ should.... (Score:4, Funny)
Time for the screwdrivers...
And by that you mean the alcoholic beverage, right?
Family tech support: proving S&M tendencies is genetic.
Anti-Windows troll (Score:1)
Re: (Score:2)
However one thing they could do is release patches as an Optional Software update as soon as they're ready, and then move them to High Priority update status on patch Tuesday.
Re: (Score:2)
oh how cute! (Score:4, Funny)
oh! what gorgeous red prancing pony!
oooh! a spinning coin, it's magic!
ha! i like how the fingers tap as they wait, it makes me smile
wait, what's this?
V1AGRATEENORGYLOANPREAPPROVEDC1A1SDEARSIRIHAVEALA
Comment removed (Score:5, Insightful)
Re: (Score:2)
There's a difference between a quick hack and a properly-written and -tested patch. Please don't fall victim to the belief that just because white/grey-hat hackers can do something quickly, they are doing it in a way that is robust enough to work in an enterprise-scale deployment, and comprehensively solves the ro
Re: (Score:1)
Re: (Score:2)
I've worked for 4 companies of various sizes, and been able to get more done in a 2 person organisation than I can in a 2500 employee company simply because in the 2500 employee company, everything needs to go to committee chaired by idiots who have no idea with regards to the problem in question, no one wants to take responsibility, and no one has the balls to make a decision.
It's more serious than just "blinking". (Score:5, Interesting)
Nasty sh.t. Even downloading and wanting to dissect it with some disassembler is already enough to set it off, the moment you use the open dialog of your dis.
Re: (Score:2)
A buffer overflow is something completely different.
I just don't understand why an internet browser would be attempting to download and parse an
Re: (Score:2)
I don't understand why
Microsoft's security gnomes (Score:5, Insightful)
Why did your "security gnomes" not speak up in the first place about such a stupid feature? Why are these things always sneaking in through cursors and screensavers? Are you keeping them busy implementing crap like this in the first place, instead of having security gnomes look at your existing code?
People will continue to leave Windows in droves because it's getting loaded with troublesome features like this that backfire even for people who aren't using them or aren't aware of them. Nobody is interested in this junk aside from malware writers and teeny boppers, but everyone is exposed to the vulnerabilities in these features anyway nonetheless because they're bundled into the OS. The vast majority of users are not interested in having their stupid mouse cursors animate. And this chronic habit of running code that arrives over the Internet from unknown sources is getting really old.
Dear Customer.. (Score:5, Funny)
Why did your "security gnomes" not speak up in the first place about such a stupid feature? Why are these things always sneaking in through cursors and screensavers? Are you keeping them busy implementing crap like this in the first place, instead of having security gnomes look at your existing code?
People will continue to leave Windows in droves because it's getting loaded with troublesome features like this that backfire even for people who aren't using them or aren't aware of them. Nobody is interested in this junk aside from malware writers and teeny boppers, but everyone is exposed to the vulnerabilities in these features anyway nonetheless because they're bundled into the OS. The vast majority of users are not interested in having their stupid mouse cursors animate. And this chronic habit of running code that arrives over the Internet from unknown sources is getting really old.
Unfortunately a hoard of deranged Mac users has invaded the Microsoft Development Center. They seized the security gnome's cave and their slashdot troll is currently blocking the entrance. Unfortunately, at the time this happened, we had just successfully repelled a massive frontal assault on our development center by a hoard of torch and pitchfork wielding penguins and as a result we were to low on throwing chairs to repel the second assault. We are sorry if this causes you any inconvenience but until the next consignment of hand made throwing chairs arrives from Italy allowing Mr Ballmer to lead us in a fresh asssault to retake the security gnome's cave we will be unable to help you with your problem. Please accept this conciliatory bucket of Microsoft® Fried Penguin drumsticks and a bottle of Microsoft Windows Vista® Kool-Aid free of charge as compensation for any inconvenience this may have caused you.
Regards
The Microsoft Support Team.
Re: (Score:3, Funny)
Merely being able to support a stupid feature on an OS platform, if someone chooses to install it, isn't quite the same as bundling the stupid feature into the operating system itself- i.e. into a browser that was forcefully (and without too much foresight) jammed up the OS hard to bamboozle a judge. All other operating systems allow you to uninstall a piece o
hmm (Score:1)
Where do you want to go today? (Score:5, Funny)
NOCs are at a higher risk (Score:2)
Like, for instance that switch over th...Oooohhh, blinky lights. Pretty.
Parser error! (Score:2)
The Reg clearly structured this sentence knowing it would make front page on
Re: (Score:2)
Funnily enough, the April Fools stories were eerily free of error. I wonder if they were trying to say something.
Impacted browsers (Score:3, Informative)
Re: (Score:2, Funny)
I think if you are running Vista, you are _damaged_ enough anyway.
Re: (Score:2)
Re: (Score:2)
Re:Impacted browsers (Score:5, Informative)
Also where in the heck do you get that GUI runs in kernel space? You seriously need to read up a bit on NT, as the Win32 subsystem itself doesn't even get to run in the kernel, let alone the GUI attached to it.
You are probably confusing video drivers that were moved to the kernel level for game performance in NT4, Win2k and WinXP, but have been moved back to User space in Vista due to a new way to harness the same level of kernel level driver performance without pushing the drivers into the kernel. (Which is actually quite clever technology if anyone is a OS Kernel nerd.)
Could you elaborate? (Score:2)
You are probably confusing video drivers that were moved to the kernel level for game performance in NT4, Win2k and WinXP, but have been moved back to User space in Vista due to a new way to harness the same level of kernel level driver performance without pushing the drivers into the kernel. (Which is actually quite clever technology if anyone is a OS Kernel nerd.)
I actually thought NT 3.51 was an exceedingly elegant system - it booted to a DOS-ish shell, you had to type "WIN" [for win.exe] if you wante
Re:Could you elaborate? (Score:4, Informative)
Um... NT 3.1, 3.5, and 3.51 all booted to the Win32 subsystem GUI. You are somehow confusing Win 3.1 or something here. NT has always used Win32 as its primary subsystem, and been graphical.
So what is this "quite clever technology" that allows Vista to return to the older model?
In lay terms, MS breaks the driver into two parts. The MS side is a kernel level interface that translates up to user mode for the MFR driver.
This is really smart for a couple of reasons.
1) It gives the performance of a kernel level driver without explosing the system to a 3rd party driver in kernel space.
2) It also allows Vista to do things even NT pre 4.0 couldn't do, like live swap video (i.e. you can remove the video card and it doesn't crash the OS.) Not only can portable and external display devices connect and disconnect effortlessly, but no matter how bad a video driver is, once Vista is running it takes an act of God for the video driver to crash the OS or leave the OS without video.
As external PCI express devices become more popular, especially for laptops, you can effortlessly switch from the onboard video to the dock or external display device. I have done this while watching a movie in Media Center and the pause to flip was less than 1 sec and it didn't even lose a frame of video.
Basically Vista can restart the video driver by virtually unplugging the video card and turning it back on, and then if the driver continues to fail Vista will continue through several steps including turning off the video again and dropping to a generic VGA driver and restarting the video card. Eventually it will even try to activate a second video device if one is present in the system and the main video won't turn back on even with generic drivers if the card is damaged.
So not only is it better protected from a bad video driver, it has a rather intelligent recovery process so that the user isn't left with a blank screen.
No, 3.51 was teh r0x0r (Score:2)
Um... NT 3.1, 3.5, and 3.51 all booted to the Win32 subsystem GUI. You are somehow confusing Win 3.1 or something here. NT has always used Win32 as its primary subsystem, and been graphical.
No, dude, you could boot NT 3.51 without graphics.
Just like with Windows 3.11 running on top of DOS, with NT 3.51 you could type "WIN" at a shell prompt and start the windows system.
It was absolutely teh r0x0r - possibly the coolest product Microsoft ever released.
Re: (Score:2)
Just like with Windows 3.11 running on top of DOS, with NT 3.51 you could type "WIN" at a shell prompt and start the windows system.
Um, no you couldn't...
NT has always booted directly to its GUI with the only exception being the "recovery console" in XP or the new boot mode in Vista that is quite like the recovery console in XP, but running the full NT kernel.
http://en.wikipedia.org/wiki/Windows_Startup_Proce ss [wikipedia.org]
NT has NEVER booted to a command line and requi
Dude, you're wrong. (Score:2)
NT has NEVER booted to a command line and required someone to type 'win' to boot the GUI. Just like a Mac has never booted to a command line. There is nothing under NT. Understand?
Dude - in NT 3.51, you could kill the windowing system.
Kinda like how you can kill "explorer.exe" in more recent versions of windows, and it sorta kills your "Active Desktop" before it [usually] reloads itself, only in NT 3.51, when you killed windows, you were left with a shell prompt, and you had to run "WIN.EXE" to restart
Re: (Score:2)
It was just like loading or unloading X-Windows on a Unix system.
Ok, Dude, NO YOU COULDN'T... You are freaking insane...
NT lacks a command-line-driven kernel. PERIOD!!!! There is no freaking way you could boot to a command line in
wrong: large chunks of the GUI are in the kernel (Score:2)
Huge portions are definitely still there.
Works flawlessly (Score:2)
Re: (Score:2)
The point is that no matter how the exploit runs, it cannot elevate its privileges above the originating EXE/DLL invoking the code.
In Vista, IE runs
Re: (Score:2)
I smell an antitrust lawsuit... such a feature should be determined by ACL on the
Re: (Score:2)
I smell an antitrust lawsuit... such a feature should be determined by ACL on the
Are you sure about that, or just speculating? I'm just curious.... as this seems like it could be useful in other types of apps as well.
Re: (Score:2)
Re: (Score:2)
Since DLLs don't run on privilege levels by themselves, being no standalone applications, they depend on the privileges available to the calling functions. Now, LoadAniIcon is (afaik) located in the user32.dll, and this dll is also used by the shell...
I agree, it ain't easy. But boy, is it rewarding!
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
Vista IE can't hand anything over to explorer. It can't even open freaking notepad to view a page's source code without getting permission.
Re: (Score:1)
Not really, I run Firefox through Drop My Rights [microsoft.com] which demotes it to limited user rights. It works on both Windows XP and Vista, and it works perfectly normal as a limited user mode (I haven't tried it in constrained or untrusted mode).
Re: (Score:2)
"protected" mode (Score:2)
Why all this planning and press releasing (Score:2, Insightful)
They are probably using this few days to figure out how they can spin the whole issue to make them look good!
I don't know why I even care... this bug doesn't effect me in the least.
Even more proof (Score:4, Insightful)
Gates "dares anybody" to exploit vista (Score:2)
[0] - http://blogs.zdnet.com/Apple/?p=422 [zdnet.com]
[1] - http://www.toptechnews.com/story.xhtml?story_id=49 854 [toptechnews.com]
At last! (Score:5, Funny)
Now all they need to do is fix the blinking Active X bugs, the blinking default open ports, the blinking UAC, and all the other blinking problems.
Pardon my language...
Speaking of which... (Score:2, Troll)
As Scotty said once (Score:2)
Microsoft please take note.
Re: (Score:2)
WTF?! Can't be... (Score:2, Funny)
Detected on Linux SMB Server... (Score:4, Informative)
BitDefender's description of their detection of this virus: