Last Year's CanSecWest Winner Repeats on Vista, Ubuntu Wins 337
DimitryGH followed up on the earlier news that the MacBook Air lost CanSecWest by noting that "Last year's winner of the CanSecWest hacking contest has won the Vista laptop in this year's competition. According to the sponsor TippingPoint's blog, Shane Macaulay used a new 0day exploit against Adobe Flash in order to secure his win. At the end of the day, the only laptop (of OS X, Vista, and Ubuntu) that remained unharmed was the one running Ubuntu. How's that for fueling religious platform wars?"
What kind of exploit? (Score:2, Insightful)
Shane Macaulay used a new 0day exploit against Adobe Flash in order to secure his win. At the end of the day, the only laptop (of OS X, Vista, and Ubuntu) that remained unharmed was the one running Ubuntu. How's that for fueling religious platform wars?"
It depends what kind of exploit that was.
Re: (Score:2, Interesting)
Or is 2.0.0.13 comparable in any way to Safari 3.1?
Security (is|as) a moving target....
Re:What kind of exploit? (Score:4, Interesting)
the fact that apple got cracked first, and presumably in a safari exploit shows that apple does not have the kind of security resources of either firefox (supported by aol, and google) or Microsoft can bring to a competition. Since the Microsoft vista system was taken out by an adobe vulnerability, and I often hear of adobe products having security holes, they might be in the same kind of boat as apple when it comes to releasing security patches.
Re: (Score:3, Insightful)
I wonder if Flash was attacked via Firefox, or in some other fashion. Through IE, running as a non-admin and with the IE7 on Vista sandboxing, any vuln in flash should have been pretty useless in owning the OS.
I wish there were more details posted.
Also interesting that the
The ONLY reason ubuntu won (Score:3, Funny)
My kid's pretend Leap-frog computer also can't run a browser or even connect to the internet. Clearly it is much safer than ubuntu.
Re: (Score:3, Informative)
Re:What kind of exploit? (Score:5, Informative)
day one were pure network attacks nobody got in on day one. day 2 was email and url based attacks. only the mac got won on day 2. on day 3 you could add non default but popular software from a list (couldn't find the list anywhere on the net, sigh) and adobe flash was vulnerable, so the vista machine got taken.
Ubuntu held up for all 3 days, but because only popular and default software could be added, this could bring a false sense of security. there are many ways to 'design' a supposedly open source software package on say, sourceforge.net but to have a compromised binary that was made with slightly altered source code... to get a trojan on a linux system. repositories tend to be fairly well monitored, but there have been times where applications that are trojans have gotten into widely used repositories. as far as i can tell, sourceforge has no real method for testing if software contains trojans or not, so it's purely up to the community that uses sourceforge to report bad software, etc. i imagine that freshmeat is the same, and many many linux users use sourceforge or freshmeat to find specific linux applications they need or want...
maybe there aren't enough linux users yet to make this a huge issue, but with Microsoft's brand image going south (kinda the way IBMs did in the 90s) linux is sure to be finding more and more people who would rather deal with OSS than with bill gates.
Popcorn anyone? (Score:5, Funny)
Re:Popcorn anyone? (Score:5, Funny)
What kind ?
And if you say a light North American lager I'm going to smite you in the name of the almighty beer lord!
Re:Popcorn anyone? (Score:5, Funny)
Re:Popcorn anyone? (Score:4, Informative)
The Monty Python joke goes along the lines of, "This lager is like making love in a canoe - it's fucking close to water"
Re: (Score:3, Funny)
Re: (Score:2, Interesting)
Re:Popcorn anyone? (Score:5, Insightful)
Re:Popcorn anyone? (Score:4, Insightful)
So by not using Windows, users are made more secure by not being such a targeted pool in the first place, (as influenced by marketshare). But the design of the OS helps too.
Re: (Score:3, Insightful)
On a typical Linux distro, the web browser runs as the same user/privs as the person using the desktop, so anything that can cause the browser or browser-plugin to reach outside of the app's sandbox can quite easily read/write to anything on the box that the desktop user can read/write to/from. Same for WinXP.
But on Vista using IE7, this is very much not the case. Even if you completely pwn the browser, its running as a user process that has almost zero ability to
Re:Popcorn anyone? (Score:4, Informative)
I'll even be nice and give you some of the information.
There are special cache locations in the registry and user profile called 'Low' that are the only places readable/writeable by IE7 in protected mode.
I did mis-speak in one sense in my post
Re:Popcorn anyone? (Score:5, Informative)
The question isn't "Is Flash vulnerable?", but rather does a vulnerability at the application layer allow you to hack into the OS. It is entirely besides the point if Flash is flawed in the same way, thought there is a reasonable likelihood that it is not in this case. There are significant differences in code compiled for the various platforms. We Software Engineers call that "conditional compilation."
Re: (Score:2, Informative)
Re:Popcorn anyone? (Score:4, Interesting)
Re:Popcorn anyone? (Score:5, Informative)
Re:Popcorn anyone? (Score:5, Funny)
This thread IS for religious wars, isn't it?
Re:Popcorn anyone? (Score:4, Informative)
And this only works if the server in question is in your Trusted Sites or Intranet Sites in IE.
Non-admin users installing printer drivers is something that is controllable via AD and Group Policy. If you set it, it loosens up acls and privs in a very specific and limited part of the system that lets non-admin users install printers.
This isnt rocket science or magic.
1. The server who hosts this printer driver is in your IE's Trusted Locations or Intranet Locations.
2. The configuration to let non-admin users install printer drivers is set on your machine.
3. There is a hole big enough within the security loosening from #2 to do anything interesting with to own the OS.
Re:Popcorn anyone? (Score:5, Informative)
Well on Windows, sandboxing of permissions is different. There might still be the exploit but the level of vulnerability would most likely be higher on a Windows system as a result of IE running at a SYSTEM level permission rather than a USER level like in Mac or Linux. Change to a different browser like Firefox on Windows and you will be safer.
IE does not, and never has, run as SYSTEM. Prior to Vista it runs as the user who starts it. In Vista it runs with privileges lower than a regular user.
I realise Slashdot is as anti-Microsoft as they come, but it's still surprising to see the same FUD about IE still being spewed 10+ years after it was shown to be false.
Re:Popcorn anyone? (Score:5, Informative)
So, prior to Vista, when it ran as the user who starts it, given that over 90% of the cases the default user has complete and unlimited access to the system files, how is running as user different from running as SYSTEM? (And, yes, I pull that "90%" figure out of my arse---but I'll bet it's higher.)
Firstly, because SYSTEM and Administrator have different privilege levels.
Secondly, because there is a vast gulf of difference between the statements "IE runs as SYSTEM" and "IE runs as the user, which is sometimes Administrator, and I think that Administrator and SYSTEM are the same". One is a (serious) architectural problem, the other is an end-user configuration problem. Trying to say they are equivalent is at best ignorance and at worst lying.
Finally, while most home systems would certainly be running users as Administrator, most managed corporate systems would not. 90% is a ridiculous over-estimate of how many XP systems only have "Administrator" users.
Re: (Score:3, Interesting)
Firstly, because SYSTEM and Administrator have different privilege levels.
To me, that makes as much difference as between kernel-level access and userland access.
That is, not a whole lot, as long as all you are trying to do is own the system or otherwise do malicious things to it. If you were a virus/trojan writer, would you ever hit yourself on the forehead saying, "Damn, this Administrator access isn't good enough. I need SYSTEM access to totally own this system"?*
The truth is, at least before Vista (I wouldn't know about Vista since I never used it), Windows' security model w
Re: (Score:3, Informative)
But I don't know *why* I can't do this with GUI applications. And there may be a good reason, so I don't want to push.
Permitting a program to connect to the X server is a pretty big statement of trust, since it has to have at least the same level of permissions the window manager does. So it's fairly carefully controlled. There are ways of making su work, which hail from back when you used telnet to do remote login and your GUI apps connected directly back to a public TCP/IP port on your terminal to get at the X server, but they're obsolete. These days, the fastest way to do what you want is to substitute ssh for su.
Re: (Score:2)
Re:Popcorn anyone? (Score:5, Funny)
Re:Popcorn anyone? (Score:5, Funny)
Software sucks. (Score:5, Interesting)
Re: (Score:3, Insightful)
Bugs like buffer overflows, the uber-exploits anyone can use to run code on your machine.
Software will suck as long as speed is more important than correctness.
Re: (Score:3, Insightful)
Okay, let's have an explanation... why *is* it possible to do any damage at all with Flash?
I guess comments like yours explain exactly why our software sucks.
Re: (Score:3, Informative)
Hey! (Score:5, Funny)
Both vulns are Mac-centric (Score:3)
Re:Hey! (Score:5, Informative)
Re: (Score:2)
Because a 0day exploit is potentially worth a lot more than $10,000?
Those that could really crack the system have a lot more in rewards than a sticker.
Re:Hey! (Score:5, Insightful)
*Useful to me; not to advertisers or corporate web designers who think interrupting the flow of my surfing and irritating the hell out of me are good ways to earn my shopping dollars
Newsworthy? (Score:4, Insightful)
Re:Newsworthy? (Score:5, Insightful)
Re:Newsworthy? (Score:5, Funny)
Re:Newsworthy? (Score:4, Informative)
Re:Newsworthy? (Score:5, Informative)
First, this wasn't some script kiddie applying a known exploit. It was a new exploit that the winning team came up with. It isn't trivial to do.
Second, no, this "could have happened to any OS" is wrong. A well-crafted browser (in this case, the browser is part of the OS) can in theory prevent browser plugins from accessing anything of importance. However I don't think any existing browsers do that - but they should.
Second, and perhaps more important, the existence of 3rd party software on different OSes isn't the same. For example, most Windows users use Adobe Acrobat to view PDFs, whereas many Linux users use FOSS PDF viewers (Evince, KPDF). It might be the case - and I am guessing that it is - that Acrobat has far more exploits against it, both because it has far more code (what with all the functionality 99% of users don't need), and that it isn't open source. In general Windows users tend to have lots of 3rd party apps that are closed source and of dubious quality. That isn't the case on Linux.
Furthermore, even if two OSes run the same app - Flash, say - that doesn't mean they are equally vulnerable. Flash isn't identical between the platforms; if I am not mistaken on Linux Flash uses Alsa for sound (or some other Linux sound system). So if Alsa is more secure than Windows' sound system, that would be one difference.
I'm not saying this competition is a great test of OS security. It isn't; it's an anecdote. But it isn't worthless either. In fact the results are pretty much what I would have expected from the beginning: OS X is a great OS but security has never been a top priority (there wasn't as much of a need for it, so why bother). Windows has focused on security recently but is hobbled by having lots of closed-source 3rd party apps. Linux was always security-focused (starting as a server OS), and has the advantage of most of its software being FOSS and arriving from a repo under the control of the distro (in this case Ubuntu).
Re:Newsworthy? (Score:5, Funny)
Re:Newsworthy? (Score:5, Interesting)
And no, it's not because IE7 is part of the operating system. It's because IE7 uses Microsoft's secure API to achieve sandbox mode. Firefox really needs to start taking advantage of this API. Otherwise their "most secure way to surf" bullshit is going to be called into question real soon.
Re:Newsworthy? (Score:5, Insightful)
In sum, what this means is that Windows systems depend heavily on closed-source software and the judgment of individual users, both of which are less secure than the community-oriented "more eyes" approach taken by open-source Linux distributions.
Newsworthy. (Score:2)
I haven't found the 3rd-party list yet, but was Flash also installed on the Ubuntu laptop?
Re: (Score:2, Insightful)
The people that participate in this are like magicians selling their secrets at
Re: (Score:2)
What did you expect? (Score:4, Insightful)
Re:What did you expect? (Score:5, Informative)
1. The contest did not require someone to 'own' the box to win. They just had to read the contents of some specific file somewhere in the OS. Unfortunately, they didnt publish where that file was, or what the file-system ACLs on it were.
2. The guy who took down the Vista box claimed in the article that it would only take them a few more hours of work to make the Flash vuln effective on OSX and Linux as well.
It is becoming more clear every day (Score:3, Interesting)
Or perhaps it's more like a dedicated sports fan seeing his team make the playoffs after 40 years of ridicule ?
Re:It is becoming more clear every day (Score:5, Funny)
Re: (Score:2)
I think it is most fitting... (Score:4, Funny)
Something is Fishy (Score:5, Informative)
Flash, like all other plugins, run within the security context of the low-rights user used by protected mode. Even if the flash plugin had an obvious buffer overflow or other exploit, it would only be able to access the data accessible by that low rights user, NOT the user running IE. That's the point of protected mode.
For a flash plugin to allow for a hacker to access personal files of the user it would not only have to have a buffer overflow (or some other exploit) in flash itself, but also take advantage of a privledge elevation exploit in Windows simultaneously.
I didn't see them specify in the article what browser than were using. Since they said it was an issue with flash, and not Windows, they couldn't have been using IE. My guess is that it was Firefox, since they said they loaded "popular" 3rd party apps.
Futhermore, the file in question must have been accessible to the user running Firefox (or whatever non-IE browser) since that would also require a privledge elevation in Windows.
So I'm not really sure how you can blame this on Vista or even Microsoft. If they had been using IE, it wouldn't have happened, regardless of the flaws in Flash. This says absolutely nothing about Vista security. The exact same thing would happen on every other OS. If you have an app with an exploit, and that app is running as User A, the hacker using that exploit has the same rights as User A.
I suppose one could argue that various defensive techniques like ASLR [msdn.com] should have stopped this, but without knowing the details, that's impossible to say. A buffer overflow can just as easily be used to call APIs exposed by the exploited application as it can to call OS APIs, and since ASLR only applies to Windows APIs (indeed, many of these techniques only apply at the OS level), this wouldn't be a fair characterization either.
Indeed, I find it strange that they didn't mention mitigating factors. I realize they're trying to be responsible as far as reporting, but telling people that users running IE on Vista aren't affected isn't exactly giving anything away... aside from the fact that Vista did its job as best it could.
Re: (Score:2)
I am guessing the file for the contest was stored in a non-critical area.
Re:Something is Fishy (Score:5, Informative)
Unless that file was specfically marked readable by the low rights user (which would be obvious cheating), or unless it was placed in a directory accessible by that user (temp directory, for instance), they could not have been using IE.
Re: (Score:2)
Re:Something is Fishy (Score:5, Informative)
A broker service is used when reading or writing to user files (such as when they save a file to their desktop, or upload a document to a web site). This isolates the potentially dangerous code into a very small (~10k lines) application that is far easier to audit. This application runs as the normal user, and essentially accepts requests from the low rights IE process when actions need to be performed on user files.
Re:Something is Fishy (Score:5, Informative)
I don't even know why Microsoft bothers trying to secure stuff when morons like Adobe just go and fuck it up.
Re: (Score:3, Insightful)
Actually, the fact that Vista held its own against every attack the contestants attempted against it for days, and only finally fell when the contest organizers modified the rules to allow exploitable third-party applications in, says a lot about Vista security. It's just that what it says about Vista security is opposite to what most Slashdottians would like it to say.
Re:Something is Fishy (Score:4, Insightful)
Really? What I hear is Vista security sucks in the real world. Seems to me that that's what most /.ers would like it to say. After all, OSes don't exist so we can admire their austere beauty, they exist so we can get things done with application programs.
Re: (Score:3, Interesting)
The guy that took down Vista claims that the same exploit can be used on Linux and OSX, just requires a few more hours work.
Not proven yet, but possible.
Re:Something is Fishy (Score:5, Informative)
You are right that plugins by default runs under the special low-rights "ieuser" account. Unless the plugin uses tricks to circumvent this security for some reason.
And that is exactly what flash does. It uses a special "broker process" which runs as a daemon/service. The restricted plugin then talks to this brokerprocess and thus breaks out of the sandbox.
The flash API indeed has methods for creating/deleting/reading files and even executing applications (Would you believe that?). Although Adobe/Macromedia have tried to ensure that flash actionscripts can only use these in a "safe" way; I believe it is probable that the exploit was somehove connected to a vuln in the broker process; quite possibly in some of these API functions. Using a broker process to break out of the sandbox can circumvent any security precautions taken by the browser.
Given that Flash vulns are often cross-platform I think it is quite likely that this also is a problem on Linux. Now, if the special file which the contestants had to retrieve required *admin rights* the yet another level of security had been broken (UAC). But at this time we can't really determine.
Re:Something is Fishy (Score:4, Informative)
Re:Something is Fishy (Score:5, Interesting)
It is running as *me*, with my rights. Not for long now, though. Bye Flash.
Oh, and there's also an "Acrotray.exe" - from the same company. Guess what that does?
Re: (Score:3, Informative)
Re:Something is Fishy (Score:5, Insightful)
See the following: background info [robertdowney.com], and most of this post [robertdowney.com] deals with UAC.
Re:Something is Fishy (Score:5, Insightful)
What the hell? Do you only read highly moderated Slashdot comments for all your information on Windows or what? One exploit in Firefox or Flash on Linux(default config on all major distros) can completely and silently wipe away all your user files or ftp them to Nigeria. All your smug talk about proper compartmentalization in "other OSes" won't help shit to stop that. Can you tell us what exactly on Linux would prevent the same hole in flash(or in Firefox) from shitting all over your user directory?
UAC is basically sudo and like the root password prompts that come up under GUI in Linux, except that MS didn't think that it would make sense to prompt a user already designated as a admin to enter the password because the vast majority of their users run in a single user environment. If the user is not an admin, then the admin password is prompted for. Can your provide some references for how windows not properly com
Contrast that to IE7 on Vista. Read this [msdn.com]. It's in part a implemtation of the Biba security model [wikipedia.org]. So a similar vulnerability in IE7 or any of its plugins(including Flash) will only be able work in sandbox that prevents access to anything but low risk files like temporary internet files.
From the linked article:So in order for the exploit on Flash to work on Vista SP1, it must have been run on Firefox/Opera/Safari/ OR it must have been run on IE7 and broken through the sandbox(quite possible, but the news shouldn't be about not only a exploit in Flash, but another one in Windows as well). THAT is the point of your parent post. And no, this is not an assumption. It's a fact even if you bury your head in sand.
Re:Something is Fishy (Score:5, Informative)
Not at all. What I'm suggesting is that when someone says that X is not possible because it isn't supposed to happen, it doesn't mean that it can't happen or won't happen. The Titanic was supposed to be unsinkable. AACS was supposed to be unbreakable. The four-minute mile was supposed to be unachievable.
I'm not foolish enough to claim that *nix cannot be rooted or cracked. Just that because of its design it is inherently more secure and more difficult to crack than a system that still allows apps to run in rootspace.
The baggage of supporting legacy apps that require(d) administrator access. Because Windows had been designed for so long to be run by a single user-administrator, there are plenty of apps that simply won't run without admin-level privileges.
Not exactly. When an OS is designed from the ground up as a multiuser system (such as *nix), it is very easy to restrict access to system resources. If I want to install a piece of software on Linux, for example, I cannot make the installation system-wide (by writing to /usr/bin, for example) without admin privileges. I cannot install libraries to /lib, /usr/lib, etc. I cannot write settings to /etc. Even when installed and executed, that program will only have a restricted set of rights based on the user/group that executes it. I can, however, compile and run executables as a user without needing admin access and without write access to system files and/or directories. I can put whatever libraries, modules, settings etc are required in my home directory without needing access to restricted areas.
Yes, I do run the risk of hosing my /home/user directory and everything inside of it, but I cannot touch any other user's files, and cannot touch system files.
Windows, on the other hand, has a hybrid model where a multi user model is tacked onto a single user-admin model, or rather support for a single user-admin model is bolted onto a basic multiuser model. Basic, because a true multi-user system would never have a single repository for all settings, like the Windows registry.
Please explain.
No. What I'm saying is that the my sysadmin's argument is very similar to the OP's argument. The OP said that because IE7 isn't supposed to allow a system level exploit via something like Flash, then therefore it isn't possible. My sysadmin said that because she configured Exchange to block autoforwarding to public webmail then it isn't possible. It is clearly possible to to autoforward my mail to gmail, and I did it and showed her to prove a point. She seems to think I manually forwarded the messages and somehow spoofed the reply-to field, and that autoforwarding is impossible because it shouldn't happen.
It's the same point I'm making now, and am running out of ways to say: Just because something shouldn't happen doesn't mean it won't or can't.
More on topic, if an app has elevated rights, then exploiting a vulnerability in that app will give the exploit/exploiter elevated rights. There are very few apps on *nix (none that I can think of) that run or need to run with elevated rights. There are a lot of apps on Windows that expect to have admin rights, regardless of whether or not such access is needed. This is why the problem is structural, and why I used the example of the incomplete wall.
1 day later. (Score:3, Insightful)
Re: (Score:2, Insightful)
Re: (Score:3, Insightful)
Not useless (Score:3, Interesting)
So the game has changed. The contest rules he
I don't know about a religious platform war .... (Score:5, Insightful)
Re:I don't know about a religious platform war ... (Score:2)
Re: (Score:2)
Re:I don't know about a religious platform war ... (Score:2)
. And Adobe Elements (that's their "lightweight" photo product) takes the better part of a minute to start up on my dual core, 2GB box (non-RAIDed SATA drive). I guess it shouldn't surprise me that they have security problems as well .
Given that it takes about 10 seconds to launch Adobe Photoshop CS3 (that's their heavyweight" photo product) on my dual-core laptop with "non-RAIDed SATA" laptop drive), and PDFs don't bring my system to its knees...
...I'd say there's something wrong with your laptop (or
Re: (Score:3, Insightful)
It brings any machine to its knees as it consumes every available resource while rendering a simple document
Not seen that. I did try FoxIt Reader when I found a rather complex pdf of a world map of submarine optical fibre connections was rendered painfully slowly, but FoxIt was even slower. I upgraded to Adobe Reader 8, and now it's actually fairly smooth; something that'd take FoxIt or Adobe Reader 7 a good 3-10 seconds to render will take under a second and once drawn, scroll smoothly.
At the same time, I've not seen it go beyond about 150MB of memory, and more commonly manages a third of that. Startup time
Re: (Score:2)
Ahem... (Score:2)
Wow. I guess the story posters here really *do* like all of the "X OS is sooooo better than Y OS" comment threads. =p Flame on, SD community. Flame on.
Sandbagging? (Score:3, Insightful)
I'd wager they each have a handy arsenal of "zero day" exploits ready for next year's competition already.
10 Things to Remember About CanSecWest (Score:3, Insightful)
"The CanSecWest contest featured a number of security researchers, each with different backgrounds, motivations, and levels of expertise working to exploit flaws in the three systems running Mac OS X, Windows Vista, and Ubuntu Linux. However, rather than being a level contest to expose the flaws in the three systems, it was really a contest highlighting the knowledge and abilities of the researchers, each of whom targeted the platform of their choice."
10 Things to Remember About CanSecWest and Software Vulnerabilities [roughlydrafted.com]
Re:Let me get this straight (Score:4, Informative)
Re:Let me get this straight (Score:4, Insightful)
Re:Let me get this straight (Score:5, Funny)
Re:Let me get this straight (Score:4, Informative)
Re:Let me get this straight (Score:5, Funny)
Re:Know this: no one uses linux on desktop, no sof (Score:3, Funny)
Re: (Score:2, Insightful)
Re:Know this: no one uses linux on desktop, no sof (Score:5, Insightful)
The really fun thing about absolute statements is that one counter-example disproves them. I use Linux on desktop. See? You're wrong. :-)
Of course, so does my wife (who majored in fashion merchandising), and my 88 year old father, and the exchange student who stayed in my house last year, and roughly half of the thousand people at PyCon two weeks ago (just from snooping screens during the plenaries), and about 4% of the desktop users world-wide. True, that's small compared to Windows' 85% share and a bit below Mac's 8%, but it's certainly not "nobody".
And note that the market share leader Windows survived the Mac by a day (though, my friend the Mac-fan said that only proves the Mac was so much more desirable than the other two laptops - touché! :-)
Well, anyway, sorry to have fed the troll.
Re: (Score:3, Funny)
Know this: people use linux on desktop (Score:3, Insightful)
Really? So this must be some magical post I'm making ...
I agree, which is why I don't "do" Windows.
I use linux at home, and linux + bsd at work.
My sister switched to an iMac, and "once you go mac, you never go back."
People routinely remote into another linux box at work when they want to get "real" work done in a mo
Re: (Score:2)
I see no reason whatsoever to return to the small, shuttered prison cell that is Windows.
Re: (Score:2)
Yes, but as small, shuttered prison cells go
Re:Know this: people use linux on desktop (Score:4, Informative)
Re: (Score:2, Insightful)
Re: (Score:3, Informative)