Print

Print


Researcher: Windows flaw remains

Saturday, Jul. 12, 2003 - Dubbed "shatter" attacks by the original
discoverer, the class of security hacks uses the Windows messaging system
to request that insecure but privileged applications run malicious code.

The Windows messaging system is the medium through which applications and
the Windows operating system communicate with each other.

Oliver Lavery, an independent researcher and author of a paper published by
security consultancy iDefense on Friday, said that Microsoft fixed the
original flaw found but left the basic messaging system untouched.

Applications that run with system privileges but don't follow Microsoft's
recommended security practices allow the vulnerability to be exploited.

"I think the point that many people have missed in the past is that this is
not a single attack, it's a type of attack," Mr. Lavery wrote in an e-mail
interview.

"Taken alone each instance of a shatter attack is a problem, but not a
critical one. The fact that this type of hole is present in many
applications, including parts of windows itself, makes the problem much
more serious."

Because the vulnerability requires that a user on the system run the attack
code many people dismissed the attack as unimportant when a researcher
released two papers on the issue last year.

No wonder: The vast majority of home users have full administrator rights
on their PCs, making privilege escalation a moot attack.

However, many corporations only allow employees to have limited user
accounts, while kiosks, libraries and Internet cafes usually don't allow
users to modify the system.

Such situations are where privilege-escalation attacks are most dangerous,
Mr. Lavery said.

"With modern Windows versions, a normal user account isn't permitted to,
say, format the drives in a computer, this sort of function should be
restricted to administrators," he said in the e-mail.

"Shatter attacks allow this restriction to be circumvented, so a hostile
program which exploits a shatter vulnerability can do far more damage than
one that does not."

Chris Paget, a security researcher, originally wrote about the "shatter"
privilege escalation attacks last fall.

"The root cause of the problem is that any application can send any message
to any other application on the same desktop," said Mr. Paget, now a senior
security consultant with Next-Generation Security Software.

"When the target application receives a message, it has no way of
discerning whether the message was sent to it by the system or by another
process."

However, the direness of his warnings and the fact that several errors were
found with some of his claims led many people to debate the importance of
the research.

Microsoft's initial dismissal of the paper reinforced that.

The software giant discounted the threat because an attacker would require
"unrestricted physical access to your computer" to use the exploit, the
company argued in a statement sent to CNET News.com last year.

Microsoft's tune changed a few months later.

In December, the company issued a patch that fixed the instance of the
problem that Mr. Paget had identified.

On Wednesday, Microsoft corrected another instance of the vulnerability
when it closed a hole in the Utility Manager, which was included in Windows
2000 to handle accessibility options for PCs.

Ian Mulholland, security program manager for the Microsoft Security
Response Center, said that the software giant had needed time to
investigate the issue before it realized the danger.

Moreover, Mr. Mulholland said that application makers that follow
Microsoft's security guidelines would not have vulnerable applications.

The company has long recommended that software makers not use the messaging
system for highly privileged applications.

At least a handful of developers still haven't adopted this basic measure
of protection.

"We published a Knowledge Base article on this back in 1994 - that
recommendation well predates this instance," he said.

"At the end of the day, we can make the recommendations, but if people
choose to do otherwise, we can't force them."

Researcher Lavery said he understands the problems in fixing the flaw.

The solution would require an extensive rewrite of vulnerable applications.

In his paper, Mr. Lavery suggests a temporary solution, but it's likely
that the issue will remain until all software makers improve the security
of their code, he said.

"The fact that numerous applications are written in a manner that is
vulnerable to message-based attacks is not due to a fundamental flaw in
Windows," he wrote.

"The flaw lies in the way programmers are writing software that runs on it."

By ROBERT LEMOS
CNET News.com
POSTED AT 6:48 PM EDT
http://www.globetechnology.com/

----------------------------------------------------------------------
To sign-off Parkinsn send a message to: mailto:[log in to unmask]
In the body of the message put: signoff parkinsn