Jump to content


- - - - -

Vista's Security Rendered Useless by New Exploit


  • Please log in to reply
6 replies to this topic

#1 Guest_scaramonga_*

Guest_scaramonga_*
  • Guests

Posted 08 August 2008 - 05:18 PM

images/news/vista.jpgThis week at the Black Hat Security Conference two security researchers will discuss their findings which could completely bring Windows Vista to its knees.

Mark Dowd of IBM Internet Security Systems (ISS) and Alexander Sotirov, of VMware Inc. have discovered a technique that can be used to bypass all memory protection safeguards that Microsoft built into Windows Vista. These new methods have been used to get around Vista's Address Space Layout Randomization (ASLR), Data Execution Prevention (DEP) and other protections by loading malicious content through an active web browser. The researchers were able to load whatever content they wanted into any location they wished on a user's machine using a variety of scripting languages, such as Java, ActiveX and even .NET objects. This feat was achieved by taking advantage of the way that Internet Explorer (and other browsers) handle active scripting in the Operating System.

While this may seem like any standard security hole, other researchers say that the work is a major breakthrough and there is very little that Microsoft can do to fix the problems. These attacks work differently than other security exploits, as they aren't based on any new Windows vulnerabilities, but instead take advantage of the way Microsoft chose to guard Vista's fundamental architecture. According to Dino Dai Zovi, a popular security researcher, "the genius of this is that it's completely reusable. They have attacks that let them load chosen content to a chosen location with chosen permissions. That's completely game over."

According to Microsoft, many of the defenses added to Windows Vista (and Windows Server 2008) were added to stop all host-based attacks. For example, ASLR is meant to stop attackers from predicting key memory addresses by randomly moving a process' stack, heap and libraries. While this technique is very useful against memory corruption attacks, it would be rendered useless against Dowd and Sotirov's new method. "This stuff just takes a knife to a large part of the security mesh Microsoft built into Vista," said Dai Zovi to SearchSecurity.com. "If you think about the fact that .NET loads DLLs into the browser itself and then Microsoft assumes they're safe because they're .NET objects, you see that Microsoft didn't think about the idea that these could be used as stepping stones for other attacks. This is a real tour de force."

While Microsoft hasn't officially responded to the findings, Mike Reavey, group manager of the Microsoft Security Response Center, said the company has been aware of the research and is very interested to see it once it has been made public. It currently isn't known whether these exploits can be used against older Microsoft Operating Systems, such as Windows XP and Windows Server 2003, but since these techniques do not rely on any one specific vulnerability, Zovi believes that we may suddenly see many similar techniques applied to other platforms or environments. "This is not insanely technical. These two guys are capable of the really low-level technical attacks, but this is simple and reusable," Dai Zovi said. "I definitely think this will get reused soon."

These techniques are being seen as an advance that many in the security community say will have far-reaching implications not only for Microsoft, but also on how the entire technology industry thinks about attacks. Expect to be hearing more about this in the near future and possibly being faced with the prospect of your "secure" server being stripped completely naked of all its protection.

Black Hat Security Conference

How To Impress Girls With Browser Memory Protection Bypasses


#2 Linoman

Linoman

    Established Member

  • Sponsor
  • PipPipPipPipPip
  • 1,536 posts
  • Country:South Africa (Cape-Town)

Posted 08 August 2008 - 07:51 PM

So much for the perfectly secure Windows Vista

#3 chriso_86

chriso_86

    Director of Technology Development

  • Global Moderator
  • PipPipPipPipPip
  • 2,271 posts
  • Location:Illinois
  • Interests:GOLFING, biking, movies, gaming (pc and xbox360), hanging with friends.
  • Country:U.S.

Posted 08 August 2008 - 08:49 PM

I could of guessed scara would post this.

#4 highlander

highlander

    Advanced Member

  • Members
  • PipPipPip
  • 129 posts
  • Country:Puerto Rico

Posted 08 August 2008 - 09:11 PM

I just think this is a ploy by the linux people in order to promote their OS.

#5 David_Heavey

David_Heavey

    =IBF2= Cofounder

  • Sponsor
  • PipPipPipPipPip
  • 949 posts
  • Location:Ireland
  • Country:Ireland

Posted 09 August 2008 - 01:15 AM

View Posthighlander, on Aug 8 2008, 10:11 PM, said:

I just think this is a ploy by the linux people in order to promote their OS.

Of course it is. Because M$ never get it wrong do they :roadrunner:

#6 m.oreilly

m.oreilly

    rog'er wilco

  • Admin
  • PipPipPipPipPipPip
  • 8,872 posts
  • Country:lower uncton

Posted 09 August 2008 - 01:54 AM

nah, it's the apple people, you know like scara and his buddies...notice you don't see scara and heavey at the same time?
i wonder...

#7 Nvyseal

Nvyseal

    Chairman of the Board

  • Administrator
  • PipPipPipPipPipPip
  • 9,830 posts
  • Location:From the whatever it is, Pluto
  • Country:USA

Posted 09 August 2008 - 02:20 AM

Quote

but since these techniques do not rely on any one specific vulnerability, Zovi believes that we may suddenly see many similar techniques applied to other platforms or environments.

I dont think its just limited to Vista or the windows platform, but can be applied to any OS




1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users