Free Republic
Browse · Search
General/Chat
Topics · Post Article

Security flaw discovered in all current 'doze versions.

Seems to be a modification of a previous flaw but it potentially affects a great number of machines so it might bear looking at.

1 posted on 04/13/2015 6:45:42 PM PDT by Utilizer
[ Post Reply | Private Reply | View Replies ]


To: Utilizer

Secondary reference article (similar info):

http://www.itnews.com.au/News/402688,windows-login-stealing-flaw-discovered-to-affect-all-versions.aspx


2 posted on 04/13/2015 6:47:00 PM PDT by Utilizer (Bacon A'kbar! - In world today are only peaceful people, and the muzlims trying to kill them)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Utilizer
Extra! Extra! Read all about it:

Software made for advertisers to stream crapola into and NSA to stream data out of computers found easy to hack

3 posted on 04/13/2015 6:48:43 PM PDT by who_would_fardels_bear
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Utilizer

From iTnews:

“In the latest variation of the technique, Cylance said users could be hacked without even clicking on a link, if attackers intercept automated requests to log on to a remote server issued by applications running in the background of a typical Windows machine, for example to check for software updates.

“The attack takes advantage of features in Windows Server Message Block, commonly known as SMB. The new variation, discovered by Cylance researcher Brian Wallace, has so far only been recreated in a lab and has not been seen on computers in the outside world.

“Cylance said the flaw affected all versions of Windows - including the yet-to-be-released Windows 10 operating system - as well as software from at least 31 companies including Adobe, Apple, Box, Microsoft, Oracle and Symantec.


4 posted on 04/13/2015 6:54:16 PM PDT by Utilizer (Bacon A'kbar! - In world today are only peaceful people, and the muzlims trying to kill them)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: dayglored

Grist for your Ping list,


5 posted on 04/13/2015 7:06:13 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users contnue...)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: All

Forgot to post entire title. Full:

“New Redirect to SMB Flaw in all Windows versions including Windows 10 allows hackers to steal login credentials”.


6 posted on 04/13/2015 7:20:07 PM PDT by Utilizer (Bacon A'kbar! - In world today are only peaceful people, and the muzlims trying to kill them)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Utilizer

Reason №46 as why I don’t use SMB/Samba/NT folder sharing.


7 posted on 04/13/2015 7:59:49 PM PDT by __rvx86 (¡SI SE PUEDE! (Cruz 2016!))
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Utilizer

SMB has historically been the source of many security holes.


11 posted on 04/13/2015 9:40:13 PM PDT by zeugma ( The Clintons Could Find a Loophole in a Stop Sign)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Utilizer; who_would_fardels_bear; Swordmaker; __rvx86; miliantnutcase; dayglored; zeugma

Ahhh, I love the smell of an SMB security thread in the middle of the night.


12 posted on 04/13/2015 9:45:33 PM PDT by PieterCasparzen (Do we then make void the law through faith? God forbid: yea, we establish the law.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Utilizer

Some flaws are worse than others. When it comes down to it, the only truly secure computer is a standalone computer....Else it take lots of network slowing processes and eternal vigilance to protect and defend any network/computer.


14 posted on 04/14/2015 4:05:13 AM PDT by trebb (Where in the the hell has my country gone?)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Utilizer
The bug is so severe that it affects not only affects all of the current versions of Windows but software from at least 31 companies including Adobe, Apple, Box, Microsoft, Oracle and Symantec say the Cylance researchers.

Sorry to burst your bubble, Util, but this affects Apple as well.

The problem is already rectified in newer browsers such as Firefox and Chrome since any direct-to-SMB call is going to be followed up with a request for credentials since kernel mode access to the user hive is unique to IE.

Also remember that SMB is not unique to Windows insomuch as any other platform can use some variant of SMB (i.e. Samba). This is also not so much a vulnerability as a flaw. If you can scrub your egress points with a proxy or firewall to prevent outbound file:// calls, you're relatively safe. If, however, the attacker is inside your network and sets up something on a local webserver that can sniff the inbound authentication traps from users attempting to access compromised machine, then you're screwed anyway; first by the fact you have a rogue internal operator and then by the fact your websites have been compromised.

My guess on Microsoft's fix: do not address direct-to-SMB calls through a browser call. Note that this does NOT affect UNC pathing or access via mapped drive.

15 posted on 04/14/2015 4:27:25 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson