Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Windows Vista still Rife with Insecure Code 330

osxpetition writes "As noted in a News.com article, Symantec researchers have been testing the latest Microsoft Windows Vista build (Beta 2), and have found that the code is 'complete with new corner cases and defects' in the networking component. Symantec describes how Microsoft scrapped the old networking stack code from Windows XP in favour of newer, rewritten code. 'Microsoft has removed a large body of tried and tested code and replaced it with freshly written code.' Since January 2002, Microsoft has put a stronger emphasis on protecting PCs by attempting to implement stable, secure code into Windows XP and their new operating system. This latest report from Symantec brings attention to Microsoft's trustworthy computing campaign, and shows how it will be a long way before it is ready for the mainstream."
This discussion has been archived. No new comments can be posted.

Windows Vista still Rife with Insecure Code

Comments Filter:
  • Re:However (Score:4, Informative)

    by Goalie_Ca ( 584234 ) on Tuesday July 18, 2006 @01:33PM (#15737993)
    Because IT's much easier to fix a square wheel than a round one!
  • by kevin_conaway ( 585204 ) on Tuesday July 18, 2006 @01:34PM (#15738002) Homepage
    I would like to know If the so-called shatter attack still works in Vista. If it does, no amount of privilege limitation can help you.

    Since you didn't provide any useful context to your question, allow me. From here [biznix.org]:

    Chris Paget says there is an irreparable hole in Win32. Any application can send a message to any window on the same desktop regardless of whether or not the window is owned by the application, and there is no authentication mechanism to prevent this from happening. Paget has published a white paper describing a "shatter attack" which allows an attacker to gain control of a system by elevating his or her privileges. Microsoft says this does not fit their criteria/definition of a security vulnerability.
  • by NutscrapeSucks ( 446616 ) on Tuesday July 18, 2006 @01:38PM (#15738049)
    Shatter attack are a configuration error, not a OS issue. They are roughly similar to running xterm as root on Unix and then complaining that users can execute root commands.

    But apparently Vista has entirely removed the idea of an "interactive service", so they won't work. Info here: http://blogs.msdn.com/larryosterman/archive/2005/0 9/14/466175.aspx [msdn.com]
  • by A beautiful mind ( 821714 ) on Tuesday July 18, 2006 @01:42PM (#15738071)
    Microsoft says this does not fit their criteria/definition of a security vulnerability.
    Technically, it is true, since it is a grave design error. The impact is much worse though, as it is not something that can be easily fixed. They missed the boat again with Vista.
  • Shatter attack (Score:5, Informative)

    by Kadin2048 ( 468275 ) <.ten.yxox. .ta. .nidak.todhsals.> on Tuesday July 18, 2006 @01:44PM (#15738092) Homepage Journal
    I had never heard of such a thing before (actually, initially I thought you were just punning on Windows + 'shattering', har har).

    It would seem that Vista allegedly fixes the design flaw that allows for the attack, by not running system services in the same session as the user. At least, that seems to be what the Wikipedia article on the topic [wikipedia.org] is suggesting.

    The key to shatter attacks is that Windows allows processes running in the same session to pass messages between each other, the result of which is that via code injection, any process can escalate up to the level of the highest process also running in its session. MS is quoted in the article as saying "[This is not] a flaw in Windows. In reality, the flaw lies in the specific, highly privileged service. By design, all services within the interactive desktop are peers, and can levy requests upon each other. As a result, all services in the interactive desktop effectively have privileges commensurate with the most highly privileged service there." (Which is amusingly doublespeak-ish; they're saying "this isn't a design flaw, we designed it that way!")

    This blog post by a member of the IE7 team [msdn.com] would confirm that they've at least tried to address this in Vista (but of course that's what you'd expect them to say). It says: "User Interface Privilege Isolation (UIPI) blocks lower-integrity from accessing higher-integrity processes. For example, a lower-integrity process cannot send window messages or hook or attach to higher priority processes This helps protect against "shatter attacks." A shatter attack is when one process tries to elevate privileges by injecting code into another process using windows messages."

    Yet another nice legacy "feature" from the single-user-OS days.
  • by A beautiful mind ( 821714 ) on Tuesday July 18, 2006 @01:54PM (#15738170)
    Actually, it is not a "grave design error".
    Yes it is [wikipedia.org]. Quoth:
    A shatter attack takes advantage of a design flaw in Windows's message-passing system whereby arbitrary code could be injected into any other running application or service in the same session, that makes use of a message loop.
  • by giorgiofr ( 887762 ) on Tuesday July 18, 2006 @01:56PM (#15738181)
    The stuff in the taskbar usually runs under your account; the problem is that the Network DDE service always runs as system and owns a transparent window on the desktop that can be passed arbitrary params by any other app on the same desktop - such as that nifty little hack you wrote...
  • by PurifyYourMind ( 776223 ) on Tuesday July 18, 2006 @01:59PM (#15738216) Homepage
    I work as a tester at a large, well-known tech company. I started using Vista back in February of this year, and I've used one of the latest versions, 5474, recently. Here are the changes I've seen:
    • Improved graphics (more complete icon set, fancier installation and login graphics, nicer titlebar look on non-3D capable systems)
    • More stability in general (some blue screen bugs I've reported have gone away with later versions)
    • More gadgets in the sidebar
    • A bit faster for file copies, file searches work a lot better -- file searching wasn't working at all at one point
    So... I'm still skeptical of their early 2007 predicted time frame, but it's definitely been getting more polished over the months.
  • by ThinkFr33ly ( 902481 ) on Tuesday July 18, 2006 @02:24PM (#15738440)
    Ah, so a wikipedia article proves that it's a design flaw in Windows?

    In that case, I'm going to post a wikipedia article stating that your a midget. It's gonna be tough living out the rest of your life as a little person.

    "Design flaw" suggests that they didn't consider this scenario. This is false. They absolutely did consider this scenario and decided it was still a good decision due to the performance implications. The developer documentation clearly warns against displaying high-priv GUI on a low-priv desktop.

    You would be very hard pressed to find a major/popular application available today that makes this attack possible. It wasn't that common to begin with, and after Microsoft's warnings, it's virtually non-existant.
  • It has been fixed (Score:5, Informative)

    by CalTrumpet ( 98553 ) on Tuesday July 18, 2006 @02:39PM (#15738566)
    Microsoft has put a signifigant amount of work into creating USER/GDI messaging passing barriers between the new Vista integrity levels. This feature is called UIPI and mostly works in the betas.

    BTW, almost no Microsoft written applications are still vulnerable to shatter attacks on XP. This is mostly an issue that still hits ISVs because they don't understand the problem.
  • Re:However (Score:4, Informative)

    by aneurysm36 ( 459092 ) on Tuesday July 18, 2006 @02:43PM (#15738611)
    another supporting opinion on this subject
    http://www.joelonsoftware.com/articles/fog00000000 69.html [joelonsoftware.com]
  • by kimvette ( 919543 ) on Tuesday July 18, 2006 @02:57PM (#15738714) Homepage Journal
    Ah, so a wikipedia article proves that it's a design flaw in Windows?


    The fact that it's on Wikipedia does not automatically mean it is false or quackery. Don't be so quick to write off Wikipedia on every subject - if in doubt, check the sources. Much, if not most, of Wikipedia's content is actually quite good. Just be willing to check the cited works in the footnotes, or verify against other, more authoritative sources. For a free up-to-the-minute encyclopedia, one cannot get anything much better than Wikipedia. Its greatest strength (anyone can edit) may be its greatest flaw, but at the same time its greatest flaw is its greatest strength. If you spot an error, you can correct it on the spot. :)
  • Re:beta (Score:5, Informative)

    by CaymanIslandCarpedie ( 868408 ) on Tuesday July 18, 2006 @03:59PM (#15739155) Journal
    FTA:Symantec researchers put the networking technology in Vista under a magnifying glass to determine its exposure to external attacks. The team said it found several flaws in build 5270 of Vista and even more in earlier test versions. However, these were all fixed by Microsoft in build 5384, the version of the operating system that was publicly released in May as Beta 2.

    For those too lazy to read the article all it really says is. We found a few issues in early releases of Vista. They've already all been fixed by Beta 2, but we are guessing there are probably more.
  • by TouchOfRed ( 785130 ) on Tuesday July 18, 2006 @07:00PM (#15740229)
    The network stack wasnt re-written post-beta, it was one of the most significant changes in longhorn next to the new driver model.
  • Comment removed (Score:2, Informative)

    by account_deleted ( 4530225 ) on Tuesday July 18, 2006 @11:58PM (#15741262)
    Comment removed based on user account deletion

The rule on staying alive as a program manager is to give 'em a number or give 'em a date, but never give 'em both at once.

Working...