Posted on 01/30/2008 10:20:42 AM PST by ShadowAce
Security researchers yesterday said they'd discredited Microsoft's claim that the year's first critical Windows vulnerability would be "difficult and unlikely" to be exploited by attackers.
On Tuesday, Immunity Inc. updated a working exploit for the TCP/IP flaw spelled out Jan. 8 in Microsoft's MS08-001 security bulletin, and posted a Flash demonstration of the attack on its Web site. The exploit, which was released to customers of its CANVAS penetration testing software -- but is not available to the public -- was a revised version of code first issued two weeks ago.
"This demonstrates conclusively that the MS08-001 IGMPv3 vulnerability is highly exploitable," said Dave Aitel, Immunity's chief technology officer, in a message to his Dailydave security mailing list.
Aitel's assertion challenged Microsoft's earlier assessment that "there are a number of factors that make exploitation of this issue difficult and unlikely in real-world conditions."
Immunity did acknowledge that its newest exploit was not 100% reliable, however.
Other security companies reacted to the revamped attack code and Flash proof by issuing new alerts. Symantec Corp., for instance, sent a new warning to customers of its DeepSight threat network. "The exploit demonstrates remote code execution," noted Symantec. "The exploit works against Windows XP SP2 English Default [and shows] two Windows XP SP2 computers on a local subnet with firewall enabled being compromised."
It urged users who have not already deployed the patches Microsoft issued Jan. 8 to do immediately.
Previously, Aitel had called out the IGMP (Internet Group Management Protocol) vulnerability as a potential blockbuster for 2008. In a detailed analysis of the flaw and its exploitation, Symantec agreed that the reward to hackers would be large even if replicating Immunity's work might be tough.
"Although exploitation of a remote kernel flaw is considered quite difficult, over the past few years numerous papers have been released on the subject," the Symantec analysis noted. "Examples of exploits successfully leveraging such flaws have also been released to the public. Therefore, we assume that this issue will be exploited in the wild to execute arbitrary code. Deploy patches immediately."
Successful attacks by the Immunity exploit -- and any similar to it developed by others -- allows arbitrary code to execute within the context of the Windows kernel, said Symantec, an especially egregious scenario for Windows Vista.
"This is especially critical on Vista, due to its enhanced kernel security mechanisms," said Symantec. "A local user, even an admin, may have difficultly introducing unsigned code into the kernel, but in this case, it can be done remotely without any authentication whatsoever.
"This vulnerability presents an opportunity to not only execute arbitrary code on the system, but also to install backdoors and other malicious tools as well as a rootkit, which may normally be more difficult with a typical remote userland vulnerability."
In its Jan. 8 MS08-001 bulletin, Microsoft ranked the IGMP flaw as "Critical" for Windows XP SP2, Windows Vista, Windows Small Business Server and Windows Home Server. On other versions, including Windows Server 2003, the bug rated an "Important" label.
Another security flaw? What do they do at Microsoft all day? Play video games?.........
All I’m waiting for is the newest Mozilla/Firefox implementation of activeX to blow out my last Winblows box.
I would think plugging security holes in Windows would be the job from hell.
The structure is all wrong, the amount of code mind-blowing. I don’t think it’s really possible to keep track of it.
You’re probably right. If I didn’t know better, I’d say it was intended to be this way..........
In a way it was.
First, they made some choices way back when to trade security for functionality, things on your network were considered friendly, making a lot of things easy to connect.
Unfortunately the Internet effectively connects the world to your network, and it’s not a friendly world.
Second, macros in documents. Making files effectively applications, applications that can give commands to the OS, is very problematic.
Third, with the legal need to make the browser integral to the operating system they bolted it in and connected it all throughout - as the user interface. Having your internet browser so connected creates problems for stopping stuff from your browser affecting other parts of the system.
So, in a way, it was intended to be this way. In the sense that they choose to trade security for other “features”.
I left out one thing that really is a feature and not MS’s fault.
It’s an open system, in the sense that it’s one piece of many, and it’s made to work (hopefully) with whatever other pieces - hardware, software, peripherals - you put together to make your system.
Without the benefit of a closed system, which Apple has in large measure, control and security problems are greatly magnified.
Vista tries to mitigate this problem significantly. It wouldn’t surprise me if this was part of the reason there are problems connecting printers and such.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.