The Mac Observer

Skip navigational links

You're viewing an article in TMO's historic archive vault. Here, we've preserved the comments and how the site looked along with the article. Use this link to view the article on our current site:
Researchers at Black Hat Reveal Major Vista Security Issue

Researchers at Black Hat Reveal Major Vista Security Issue

by , 2:00 PM EDT, August 8th, 2008

On day two of the Black Hat security conference, Mark Dowd with IBM and Alexander Sotirov with VMware presented a paper on a technique to completely bypass the memory protection features of Microsoft Vista along with recommendations to Microsoft.

In their talk, entitled, "How to Impress Girls with Browser Memory Protection Bypasses," the researchers showed how take advantage of the way IE and other browsers handle active scripting in the OS.

The description of the presentation from the Black Hat conference said:

"Over the past several years, Microsoft has implemented a number of memory protection mechanisms with the goal of preventing the reliable exploitation of common software vulnerabilities on the Windows platform. Protection mechanisms such as GS, SafeSEH, DEP and ASLR complicate the exploitation of many memory corruption vulnerabilities and at first sight present an insurmountable obstacle for exploit developers.

"This talk aims to present exploitation methodologies against this increasingly complex target. We will demonstrate how the inherent design limitations of the protection mechanisms in Windows Vista make them ineffective for preventing the exploitation of memory corruption vulnerabilities in browsers and other client applications.

"Each of the aforementioned protections will be briefly introduced and its design limitations will be discussed. We will present a variety of techniques that can be used to bypass the protections and achieve reliable remote code execution in many different circumstances. Finally, we will discuss what Microsoft can do to increase the effectiveness of the memory protections at the expense of annoying Vista users even more."

Vista, as well as Mac OS X and Linux, uses a technique called ASLR to randomly change the locations of certain addressable memory locations so that malware cannot insert executable code. It's not a substitute for secure code, but can reduce vulnerability. Mr. Dowd's presentation focused on how to get around ASLR and other techniques like Data Execution Prevention (DEP).

Back in June, Mr. Dowd predicted that his coming demonstration would obliterate Vista security improvements.

"We're going to show a couple of ways you can tip the odds in your favour so vulnerabilities can be easily exploited by techniques that bypass these protection mechanisms," he said. "Some completely obliterate the protections."

According to neowin.net, Dino Dai Zovi, a popular security researcher said, "the genius of this is that it's completely reusable. They have attacks that let them load chosen content to a chosen location with chosen permissions. That's completely game over."

Microsoft is aware of the issue, and the verdicts are just starting to come in how how serious this breach is and what can be done to prevent it. The good news is that as these exploits are discovered and analyzed by the good guys at conferences like Black Hat, the OS vendors can work to remain one step ahead of the bad guys.

Recent Headlines - Updated August 30th

Fri,8:00 PM
Get Free Bitcoins with 45 Website Faucets that Really Pay [Update]
7:56 PM
Level Up Contacts with Contact Center
6:40 PM
8 Predictions for Apple’s September 9 Media Event
5:15 PM
How To Tell iMessages From Text Messages
5:02 PM
2 Deals and 4 Freebies
3:44 PM
Apple’s September 9 Event Won’t be What we Expect
1:56 PM
Emoji-Only Social Network Emojili App Released on iTunes
1:08 PM
TMO Daily Observations: 2014-08-29
11:05 AM
New Photos Show iPhone 6 in Grey, Gold, Silver
9:42 AM
Bloomberg Backs Up Wearables Announcement at Apple’s Sept 9 Event
8:45 AM
iTunes: Deauthorize Before You Sell Your Mac
Thu,8:01 PM
Apple Granted 14 Years Protection for 5th Ave Glass Cube by Patent Office
  • __________
  • Buy Stuff, Support TMO!
  • Podcast: Mac Geek Gab
  • Podcast: Apple Weekly Report
  • TMO on Twitter!