Google Researchers Find Wormable 'Crazy Bad' Windows Exploit (bleepingcomputer.com) 74
An anonymous reader quotes a report from BleepingComputer: Two Google security experts have found a severe remote code execution (RCE) bug in the Windows OS, which they've described as "crazy bad." The two experts are Natalie Silvanovich and Tavis Ormandy, both working for Project Zero, a Google initiative for discovering and helping patch zero-days in third-party software products. The two didn't release in-depth details about the vulnerability, but only posted a few cryptic tweets regarding the issue. Drilled with questions by the Twitter's infosec community, Ormandy later revealed more details: the attacker and the victim don't necessarily need to be on the same LAN; the attack works on a default Windows install, meaning victims don't need to install extra software on their systems to become vulnerable; the attack is wormable (can self-replicate). The tweets came days before Microsoft's May 2017 Patch Tuesday, scheduled tomorrow, May 9. The researchers said a report is coming, alluding the vulnerability might be patched this month, and they'll be free to publish their findings.
I feel left out (Score:4, Funny)
Can we post some equally-bad Linux vulns please? Intel, Microsoft, they can't be the only ones having all the fun.
Re: (Score:3, Informative)
That's a local privilege escalation exploit, not a remote code execution vulnerability.
Re: (Score:2)
Can we post some equally-bad Linux vulns please? Intel, Microsoft, they can't be the only ones having all the fun.
Yeah but to be fair, it's way funnier when it's Windows!
Re: (Score:1)
Can we post some equally-bad Linux vulns please? Intel, Microsoft, they can't be the only ones having all the fun.
I've got you covered, no worries! Here is a single vulnerability that affects every single device, OS, and piece of software there is;
"Government."
Government is and has always been, even prior to the internet, the biggest threat to citizens' privacy and security. As well as their freedom and their lives. More people have died at the hands of their own governments than have died in war.
Strat
Re: I feel left out (Score:3)
Re: (Score:2)
Given that usually it's governments that declare wars, maybe you should count war deaths as caused by the government, too.
Re: (Score:2)
Governments and the politicians in them may declare wars, but the populace has to be willing in all but the most brutally-authoritarian regimes like N. Korea. That's why an informed, educated, and non-apathetic populace was deemed so important by the US founders. Also, wars are often fought over trade/economic and resources like fossil fuels. Japan decided to go to war against the US in the practical sense because the US was s
Re: (Score:3)
Re: I feel left out (Score:1)
Seeing as how you want to lump android in with linux and continue to whine about 4.4.... Are mobile windows phones around still to even receive patches?
Re: (Score:1)
2.) Regarding Mint, from the referenced article: "Because the crooks didn’t manage to hack the actual Linux Mint repositories, they weren’t able to compromise the Mint source code, or the official Mint download ISOs (disk images), or even the list of official download checksums."
3.) Comparing the Andriod & iOS installed user bases with that of Windows phones is somewhat deceptive.
Re: (Score:3)
Heartbeed is an exploit in openssl, not the OS. Shellshock is also not tied to the OS itself - it is a privilege escalation exploit that was useful in Apache (if you had mod_cgi in place and on), and was maybe useful in a convoluted way in SSH (*if* you knew the account and *if* it had an ssh keypair set, and *if* you had those keys).
Gonna have to try a bit harder for that one ;)
PS: patches are usually back-ported for RedHat for 10 years (longer if you bought ELS... to put it into perspective, they just bar
Re: (Score:2)
Re: (Score:1)
You just need to press the enter key for 70 seconds to get root access
http://thehackernews.com/2016/11/hacking-linux-system.html
Send the correctly formatted packet and get root access
https://nvd.nist.gov/vuln/detail/CVE-2010-3904
There were a couple of display related bugs:
https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-updates/+bug/1032344
Datagram Congestion Control Protocol
https://www.theregister.co.uk/2017/02/23/linux_kernel_gets_patch_against_12yearold_bug/
Re: (Score:2)
The one I recall is an email spammed to a typical Linux User that says something like:
Dear Sir or Madam:
This email is the infection vector for a Linux virus! Please follow the instructions below. Do not break the chain, or you will have twenty years of bad luck and all of your hair will fall out as well! No fair making a backup copy of your user directory(s) first!
a) First, please forward this email to all of your friends. If you have no friends, forward it to anyone you know well enough to send email t
Re: (Score:2)
b) When this step is completed, please login as root and enter the following string into a terminal window:
"cp /usr/bin/rm /tmp; /tmp/rm -rf /home/*; /tmp/rm -rf /usr/*; /tmp/rm -rf /var/*; /tmp/rm -rf /boot/*; /tmp/rm -rf /etc/*"
That's a bit cumbersome... why not just do sudo rm -rf .* ?
Re: (Score:2)
Because in that case it will delete /etc long before /home and /usr (both typically mounts). Deleting /etc makes it quite likely, although not certain, that the system will crash before it actually damages the contents of /home, /usr and /var. That makes it too easy to recover with a partial reinstall without losing any actual data beyond the system's ssh keys and any work that went in to setting up printers or the like.
Most of which I learned, long ago, the hard way. It is probably less of an issue with
Whaaat? (Score:1)
I already removed the virus (Score:1, Troll)
And installed debian instead of windows..
Re: I already removed the virus (Score:1)
Pulseaudio works wonderfully.
As long as you have the exact hardware that Lennart is running.
Re: (Score:2)
What I don't like is the obscurity of the article about the problem. Granted they may not want to give out too much info to prevent someone to make such a worm. However not knowing the nature of the vulnerability, how do we know what to do to protect our systems? Going to Linux may work for your home PC but for work you may have those silly legacy apps that you just can't move over.
Listening by default (Score:4, Insightful)
Re: (Score:1)
I feel like it has to be in update or something.
Something that actively pulls.
but I may be reading too much into being on a different LAN.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: Listening by default (Score:2)
slashdoted already (Score:2)
Re: (Score:2)
Re: (Score:2)
It's both. It's an RCE exploit that either gives sufficient privileges to self-replicate or uses a process that has inherently sufficient privileges to self-replicate without requiring any further privileges.
Windows Defender - CVE-2017-0290 (Score:5, Informative)
Official announcement: https://technet.microsoft.com/en-us/library/security/4022344 [microsoft.com]
More background / report: https://bugs.chromium.org/p/project-zero/issues/detail?id=1252&desc=5 [chromium.org]
tl;dr: The Javascript engine in Windows Defender (which tries to figure out if it's a virus) has a flaw. Exploit works and can be leveraged if you can force the victim to write something to disk (triggering a scan): eg, sending an email, viewing an image, writing a log entry, etc.
Not a Windows Update, the fix is coming as part of the Windows Defender definitions updates rollout process.
Re: Windows Defender - CVE-2017-0290 (Score:2)
Re:Windows Defender - CVE-2017-0290 (Score:4, Funny)
With a Defender like that, you don't need enemies.
Re: (Score:2)
It's not wormable out of the box on a client but any service that hands off an incoming file to the scanning engine is potentially vulnerable. You could get a long way with a worm that spreads over HTTP, SMTP, SMB, IM.
Re: (Score:2)
Comment removed (Score:4, Informative)
Re: Informative although quite misleading (Score:1)
By your logic, stack-smashing to trigger arbitrary code execution is impossible. I think you just don't really know what you are talking about.
Tavis Ormandy is legit.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Already fixed (Score:3)
MS have already pushed a fix for this out; everything should magically auto-update to fix the vulnerability.
More details here [microsoft.com].
Good job by all. Responsible disclosure plus super fast response time.
Already patched (Score:1)
wormable (Score:2)
Remote exploit that can replicate is bad, very, very bad. The Sapphire worm reached exponential growth and infected 90% of vulnerable systems in 10 minutes. It was a single UDP packet (no timeouts, handshakes, etc.) but some research I did a decade ago proved that, at least theoretical, a TCP-based worm can perform in the same order of magnitude.
Not much has happened in this area recently, mostly because the bad guys have shifted to spam, botnets and ransomware. With the IoT, there's a lot of fun just aroun