Welcome, Guest. Please login or register.
July 29, 2025, 01:58:01 PM

Login with username, password and session length

Search:     Advanced search
we're back, baby
*
Home Help Search Login Register
f13.net  |  f13.net General Forums  |  Gaming  |  Topic: Vista Pwned? 0 Members and 1 Guest are viewing this topic.
Pages: [1] 2 Go Down Print
Author Topic: Vista Pwned?  (Read 11514 times)
Ookii
Staff Emeritus
Posts: 2676

is actually Trippy


WWW
on: August 08, 2008, 02:48:50 PM

I apologize if this is already posted.

Mark Dowd of IBM Internet Security Systems (ISS) and Alexander Sotirov, of VMware Inc. have discovered a technique that can be used to bypass all memory protection safeguards that Microsoft built into Windows Vista. These new methods have been used to get around Vista's Address Space Layout Randomization (ASLR), Data Execution Prevention (DEP) and other protections by loading malicious content through an active web browser. The researchers were able to load whatever content they wanted into any location they wished on a user's machine using a variety of scripting languages, such as Java, ActiveX and even .NET objects. This feat was achieved by taking advantage of the way that Internet Explorer (and other browsers) handle active scripting in the Operating System.

While this may seem like any standard security hole, other researchers say that the work is a major breakthrough and there is very little that Microsoft can do to fix the problems. These attacks work differently than other security exploits, as they aren't based on any new Windows vulnerabilities, but instead take advantage of the way Microsoft chose to guard Vista's fundamental architecture.
According to Dino Dai Zovi, a popular security researcher, "the genius of this is that it's completely reusable. They have attacks that let them load chosen content to a chosen location with chosen permissions. That's completely game over."

http://www.neowin.net/news/main/08/08/08/vista39s-security-rendered-completely-useless-by-new-exploit

Is there any truth to this?

Murgos
Terracotta Army
Posts: 7474


Reply #1 on: August 08, 2008, 03:04:33 PM

That it can't be fixed?

If find it unlikely that anyone credible would make that claim.  It's a program, it can always be changed.  The rest of it?  No clue.

"You have all recieved youre last warning. I am in the process of currently tracking all of youre ips and pinging your home adressess. you should not have commencemed a war with me" - Aaron Rayburn
TripleDES
Terracotta Army
Posts: 1086


WWW
Reply #2 on: August 08, 2008, 03:19:19 PM

Probably a bit of hyperbole, but this seems to be a problem that requires a little more than a service pack.

I guess their own code is biting them in the ass. Yet again. I bet Dave Cutler is chewing on a broom right now. As designer of VMS, the poster child for stability and security, he probably didn't intend Windows NT to become this shit fest of current-day Windows.

EVE (inactive): Deakin Frost -- APB (fukken dead): Kayleigh (on Patriot).
eldaec
Terracotta Army
Posts: 11844


Reply #3 on: August 08, 2008, 03:29:42 PM

One day someone needs to explain to me why the fuck we aren't still using VMS for serious business.

"People will not assume that what they read on the internet is trustworthy or that it carries any particular ­assurance or accuracy" - Lord Leveson
"Hyperbole is a cancer" - Lakov Sanite
TripleDES
Terracotta Army
Posts: 1086


WWW
Reply #4 on: August 08, 2008, 03:34:28 PM

It's still in use in various places. Like airports, i.e. air traffic control systems. But on older existing systems. New ones will run on "contemporary" operating systems, since coding for VMS is something apparently only senile people still do. Like coding in COBOL, too.

EVE (inactive): Deakin Frost -- APB (fukken dead): Kayleigh (on Patriot).
Trippy
Administrator
Posts: 23657


Reply #5 on: August 08, 2008, 04:00:45 PM

Is there any truth to this?
Have to wait and see what's in their presentation.

One day someone needs to explain to me why the fuck we aren't still using VMS for serious business.
Cause (Open)VMS isn't being kept up to date for the latest hardware (and software trends) so people are using Unix/Linux instead.

Also the creator of VMS went to MS and built NT which Vista is a descendant of awesome, for real
eldaec
Terracotta Army
Posts: 11844


Reply #6 on: August 09, 2008, 03:04:04 AM

NT isn't descendant, it's a disowned retarded cousin we don't talk about.

"People will not assume that what they read on the internet is trustworthy or that it carries any particular ­assurance or accuracy" - Lord Leveson
"Hyperbole is a cancer" - Lakov Sanite
Trippy
Administrator
Posts: 23657


Reply #7 on: August 09, 2008, 03:12:06 AM

NT is actually a decent kernel. It's gotta a little long in tooth but it's served MS well for a long time now. The stuff above the kernel however...
Kitsune
Terracotta Army
Posts: 2406


Reply #8 on: August 09, 2008, 03:23:24 AM

The real question is whether this exploit can function when encountered by an account with basic user privileges, or if it only works when someone's logged in as an administrator.  If the former, that's a real 'oh shit' moment; the latter, not so much.  ASLR and DEP aren't the entirety of Vista's security; UAC would also need to be circumvented.  As long as the owner hasn't turned it off.    Ohhhhh, I see.
Engels
Terracotta Army
Posts: 9029

inflicts shingles.


Reply #9 on: August 09, 2008, 09:00:38 AM

I thought UAC -=was=- the security feature in Vista. Sorta the same principle as sudo, cept executed in a way to ensure maximum irritation.

I should get back to nature, too.  You know, like going to a shop for groceries instead of the computer.  Maybe a condo in the woods that doesn't even have a health club or restaurant attached.  Buy a car with only two cup holders or something. -Signe

I LIKE being bounced around by Tonkors. - Lantyssa

Babies shooting themselves in the head is the state bird of West Virginia. - schild
Goreschach
Terracotta Army
Posts: 1546


Reply #10 on: August 09, 2008, 01:09:47 PM

I thought UAC -=was=- the security feature in Vista. Sorta the same principle as sudo, cept executed in a way to ensure maximum irritation.

It's -=a=- security feature. It's not the only thing they added. At any rate, even with UAC deactivated, and this bug able to get around memory protection, that still only puts you at around XP levels of danger. And people have been using XP on the internet for years, without the world imploding. Just use an up-to-date browser with security turned on, don't win free ipods, and don't go to bullshit dubious sites.

Or you can just install noscript, and be done with all of this nonsense, forever.
MahrinSkel
Terracotta Army
Posts: 10859

When she crossed over, she was just a ship. But when she came back... she was bullshit!


Reply #11 on: August 09, 2008, 02:57:40 PM

Back in DX3 days, NT was actually far superior for gaming.  40% framerate boosts going from 98 to NT were typical.  Windows 2000 beta was equally good, until they deliberately pulled DX7 out of it.

--Dave

--Signature Unclear
Salamok
Terracotta Army
Posts: 2803


Reply #12 on: August 09, 2008, 07:08:36 PM

That it can't be fixed?

If find it unlikely that anyone credible would make that claim.  It's a program, it can always be changed.  The rest of it?  No clue.

the claim is the OS can't be fixed, this is because it is a browser exploit.  Basically at some fundamental "unfixable level" the OS trusts the browsers opinion as to what is a valid .net component.  The exploit is basically a way of convincing the browser that any .net component you load into it is valid and the OS inherits it.  They as much as say this isn't a vista specific flaw it's an ie flaw that can be applied to other OS's. 
Brolan
Terracotta Army
Posts: 1395


Reply #13 on: August 09, 2008, 08:40:41 PM

It's still in use in various places. Like airports, i.e. air traffic control systems. But on older existing systems. New ones will run on "contemporary" operating systems, since coding for VMS is something apparently only senile people still do. Like coding in COBOL, too.

Hey, I make a fuck-load of money coding in COBOL.
Trippy
Administrator
Posts: 23657


Reply #14 on: August 09, 2008, 10:09:07 PM

That it can't be fixed?

If find it unlikely that anyone credible would make that claim.  It's a program, it can always be changed.  The rest of it?  No clue.
No they aren't claiming it can't be fixed:

Quote
In this paper we demonstrated that the memory protection mechanisms available in the latest
versions of Windows are not always effective when it comes to preventing the exploitation of
memory corruption vulnerabilities in browsers. They raise the bar, but the attacker still has a
good chance of being able to bypass them. Two factors contribute to this problem: the degree to
which the browser state is controlled by the attacker; and the extensible plugin architecture of
modern browsers.

The internal state of the browser is determined to a large extent by the untrusted and potentially
malicious data it processes. The complexity of HTML combined with the power of JavaScript and
VBscript, DOM scripting, .NET, Java and Flash give the attacker an unprecedented degree of
control over the browser process and its memory layout.

The second factor is the open architecture of the browser, which allows third-party extensions
and plugins to execute in the same process and with the same level of privilege. This not only
means that any vulnerability in Flash affects the security of the entire browser, but also that a
missing protection mechanism in a third-party DLL can enable the exploitation of vulnerabilities
in all other browser components.

The authors expect these problems to be addressed in future releases of Windows and browser
plugins shipped by third parties.

Backing up a bit this isn't about hacking UAC or anything like that. It's about bypassing the mechanism MS has been adding to Windows and programs developed for Windows to try and minimize the now ubiquitous "remote code execution" problem. The authors presented a number of techniques for bypassing those protections when going through IE 7.

Paper and code examples are here:

http://taossa.com/index.php/2008/08/07/impressing-girls-with-vista-memory-protection-bypasses/
Soln
Terracotta Army
Posts: 4737

the opportunity for evil is just delicious


Reply #15 on: August 10, 2008, 02:10:47 AM

is like that Coreflood Admin sploit?  I think that's known. Maybe not solved but known.  Dunno.
Trippy
Administrator
Posts: 23657


Reply #16 on: August 10, 2008, 02:28:56 AM

Yegolev
Moderator
Posts: 24440

2/10 WOULD NOT INGEST


WWW
Reply #17 on: August 10, 2008, 09:46:05 AM

Hmph.  It's always the browser, isn't it?  If MS just let you deinstall IE, we'd not have these massive holes... at least according to what I can see.

Why am I homeless?  Why do all you motherfuckers need homes is the real question.
They called it The Prayer, its answer was law
Mommy come back 'cause the water's all gone
Salamok
Terracotta Army
Posts: 2803


Reply #18 on: August 10, 2008, 06:47:33 PM

I'm def not a fan of active x browser objects but I really don't think firefox would be all that much better if it was under the scrutiny that having 80% of the market share brings. 

Trippy
Administrator
Posts: 23657


Reply #19 on: August 10, 2008, 07:22:00 PM

Firefox allows plug-ins like Java and Flash that the authors used to demonstrate the problems with Vista's memory protection schemes through IE 7 so it's possible some of those same techniques are transferable to other browsers.
Phred
Terracotta Army
Posts: 2025


Reply #20 on: August 11, 2008, 01:44:46 AM

One day someone needs to explain to me why the fuck we aren't still using VMS for serious business.

Most businesses were sold on NT as an operating system that didn't need professional sysadmins to take care of it.  Now you have your IT staff.  They work cheaper but tend to know a lot less about how to really fix things because they all took their certification from Microsoft, who's solution to everything is buy more software from us.
Yegolev
Moderator
Posts: 24440

2/10 WOULD NOT INGEST


WWW
Reply #21 on: August 11, 2008, 07:02:30 AM

I'm not bashing IE over Firefox, it's just that I can actually deinstall Firefox if I choose.

Why am I homeless?  Why do all you motherfuckers need homes is the real question.
They called it The Prayer, its answer was law
Mommy come back 'cause the water's all gone
Mrbloodworth
Terracotta Army
Posts: 15148


Reply #22 on: August 11, 2008, 07:14:21 AM


Today's How-To: Scrambling a Thread to the Point of Incoherence in Only One Post with MrBloodworth . - schild
www.mrbloodworthproductions.com  www.amuletsbymerlin.com
fuser
Terracotta Army
Posts: 1572


Reply #23 on: August 11, 2008, 08:19:22 AM

I thought UAC -=was=- the security feature in Vista. Sorta the same principle as sudo, cept executed in a way to ensure maximum irritation.

It's -=a=- security feature. It's not the only thing they added. At any rate, even with UAC deactivated, and this bug able to get around memory protection, that still only puts you at around XP levels of danger.

Only one thing irritates me about UAC, it blocks remote connection confirmation dialogues, you have to be physically there.. fun things for our VNC support. Either then that I don't see how its any more annoying then OSX's lock, admin password request, etc.

Edit: Yes i know this is the whole point of UAC, just my only "annoyance" with it ;)
Trippy
Administrator
Posts: 23657


Reply #24 on: August 11, 2008, 08:26:23 AM

Only one thing irritates me about UAC, it blocks remote connection confirmation dialogues, you have to be physically there.. fun things for our VNC support. Either then that I don't see how its any more annoying then OSX's lock, admin password request, etc.

Edit: Yes i know this is the whole point of UAC, just my only "annoyance" with it ;)
I don't use Vista but I do use Mac OS X so this is only based on what I've read but my understanding is with the default settings with UAC it comes up quite a bit. With OS X it rarely prompts you for your password to do "sudo" type stuff -- i.e. it's mostly when you are installing Apple Software Updates. Regular software installs (which are a trivial click and drag operation) and day to day stuff you never get prompted for your password.
schild
Administrator
Posts: 60350


WWW
Reply #25 on: August 11, 2008, 08:34:13 AM

UAC comes up all the time on default settings. First thing I turned off, other than a bunch of graphical effects.
Yegolev
Moderator
Posts: 24440

2/10 WOULD NOT INGEST


WWW
Reply #26 on: August 11, 2008, 08:39:20 AM

UAC is a good idea, but I only hear about people turning it off.  With sudo, I can finely control pretty much everything.  Does UAC allow anything other than ON/OFF?

Why am I homeless?  Why do all you motherfuckers need homes is the real question.
They called it The Prayer, its answer was law
Mommy come back 'cause the water's all gone
schild
Administrator
Posts: 60350


WWW
Reply #27 on: August 11, 2008, 08:44:59 AM

UAC is just implemented badly. Things get flagged for protection under it that shouldn't have it. It doesn't quite know if something is good or bad. And it's not set for just Very Specific things. Mostly it's crap. AFAIK there's only On and Off. Morons, sure, I can see them needing it, but then, morons shouldn't be on a computer really.
Engels
Terracotta Army
Posts: 9029

inflicts shingles.


Reply #28 on: August 11, 2008, 08:53:52 AM


I don't use Vista but I do use Mac OS X so this is only based on what I've read but my understanding is with the default settings with UAC it comes up quite a bit. With OS X it rarely prompts you for your password to do "sudo" type stuff -- i.e. it's mostly when you are installing Apple Software Updates. Regular software installs (which are a trivial click and drag operation) and day to day stuff you never get prompted for your password.


I know that on my regular installations of Office 2008 for Mac, I'm prompted for a password. Another thing to bear in mind is that Apple isn't as paranoid as Microsoft in this regard, and can aford not to sudo everything in sight.


I should get back to nature, too.  You know, like going to a shop for groceries instead of the computer.  Maybe a condo in the woods that doesn't even have a health club or restaurant attached.  Buy a car with only two cup holders or something. -Signe

I LIKE being bounced around by Tonkors. - Lantyssa

Babies shooting themselves in the head is the state bird of West Virginia. - schild
Krakrok
Terracotta Army
Posts: 2190


Reply #29 on: August 11, 2008, 11:06:41 AM

Hey, I make a fuck-load of money coding in COBOL.

California needs you!
TripleDES
Terracotta Army
Posts: 1086


WWW
Reply #30 on: August 11, 2008, 11:25:29 AM

It would help if UAC allowed for fine grained on-off settings, based on actions and applications. For instance it's nice it kicks in when a random application tries funny business, but it's fucking annoying if Explorer is second guessing every single fucking action I do outside of my profile directory.

EVE (inactive): Deakin Frost -- APB (fukken dead): Kayleigh (on Patriot).
kildorn
Terracotta Army
Posts: 5014


Reply #31 on: August 11, 2008, 11:48:16 AM

UAC is obnoxious with a lot of things. Java updater, certain directories, Manage Computer, etc etc.

It was set to Holy Crap due to the amount of stupid people try to do, and all the flak MS gets for shitty security. That said, a lot of their issues come from IE being a horrible mess, and also being so closely tied to the OS. It's like running a security company that employs a crack addict as it's night shift. No matter how good the rest of it is, you still have a goddamned crack addict with keys to the place.
Big Gulp
Terracotta Army
Posts: 3275


Reply #32 on: August 11, 2008, 03:02:07 PM

No matter how good the rest of it is, you still have a goddamned crack addict with keys to the place.

Note to self:  review hiring practices.
Trippy
Administrator
Posts: 23657


Reply #33 on: August 11, 2008, 04:18:00 PM

I don't use Vista but I do use Mac OS X so this is only based on what I've read but my understanding is with the default settings with UAC it comes up quite a bit. With OS X it rarely prompts you for your password to do "sudo" type stuff -- i.e. it's mostly when you are installing Apple Software Updates. Regular software installs (which are a trivial click and drag operation) and day to day stuff you never get prompted for your password.
I know that on my regular installations of Office 2008 for Mac, I'm prompted for a password. Another thing to bear in mind is that Apple isn't as paranoid as Microsoft in this regard, and can aford not to sudo everything in sight.
If Office 2008 requires an "installer" like the kind used in the Windows world then yeah I'm not surprised it requires a password. Normal Mac apps are self-contained folders and you just drag them to wherever you want install (and you can just throw the folder into the Trash to delete) and as long as you have permissions to that folder it won't ask for a password. If the install is so complicated that it has to spread crap all over the place including "system" folders (which is typically what the Apple Software Updates need to do) then you'll need your password.
Engels
Terracotta Army
Posts: 9029

inflicts shingles.


Reply #34 on: August 11, 2008, 06:25:47 PM

If the install is so complicated that it has to spread crap all over the place

Sounds about right for a Windows product installation...

I should get back to nature, too.  You know, like going to a shop for groceries instead of the computer.  Maybe a condo in the woods that doesn't even have a health club or restaurant attached.  Buy a car with only two cup holders or something. -Signe

I LIKE being bounced around by Tonkors. - Lantyssa

Babies shooting themselves in the head is the state bird of West Virginia. - schild
Pages: [1] 2 Go Up Print 
f13.net  |  f13.net General Forums  |  Gaming  |  Topic: Vista Pwned?  
Jump to:  

Powered by SMF 1.1.10 | SMF © 2006-2009, Simple Machines LLC