The Mac Observer

Skip navigational links

You're viewing an article in TMO's historic archive vault. Here, we've preserved the comments and how the site looked along with the article. Use this link to view the article on our current site:
Researchers at Black Hat Reveal Major Vista Security Issue

Researchers at Black Hat Reveal Major Vista Security Issue

by , 2:00 PM EDT, August 8th, 2008

On day two of the Black Hat security conference, Mark Dowd with IBM and Alexander Sotirov with VMware presented a paper on a technique to completely bypass the memory protection features of Microsoft Vista along with recommendations to Microsoft.

In their talk, entitled, "How to Impress Girls with Browser Memory Protection Bypasses," the researchers showed how take advantage of the way IE and other browsers handle active scripting in the OS.

The description of the presentation from the Black Hat conference said:

"Over the past several years, Microsoft has implemented a number of memory protection mechanisms with the goal of preventing the reliable exploitation of common software vulnerabilities on the Windows platform. Protection mechanisms such as GS, SafeSEH, DEP and ASLR complicate the exploitation of many memory corruption vulnerabilities and at first sight present an insurmountable obstacle for exploit developers.

"This talk aims to present exploitation methodologies against this increasingly complex target. We will demonstrate how the inherent design limitations of the protection mechanisms in Windows Vista make them ineffective for preventing the exploitation of memory corruption vulnerabilities in browsers and other client applications.

"Each of the aforementioned protections will be briefly introduced and its design limitations will be discussed. We will present a variety of techniques that can be used to bypass the protections and achieve reliable remote code execution in many different circumstances. Finally, we will discuss what Microsoft can do to increase the effectiveness of the memory protections at the expense of annoying Vista users even more."

Vista, as well as Mac OS X and Linux, uses a technique called ASLR to randomly change the locations of certain addressable memory locations so that malware cannot insert executable code. It's not a substitute for secure code, but can reduce vulnerability. Mr. Dowd's presentation focused on how to get around ASLR and other techniques like Data Execution Prevention (DEP).

Back in June, Mr. Dowd predicted that his coming demonstration would obliterate Vista security improvements.

"We're going to show a couple of ways you can tip the odds in your favour so vulnerabilities can be easily exploited by techniques that bypass these protection mechanisms," he said. "Some completely obliterate the protections."

According to neowin.net, Dino Dai Zovi, a popular security researcher said, "the genius of this is that it's completely reusable. They have attacks that let them load chosen content to a chosen location with chosen permissions. That's completely game over."

Microsoft is aware of the issue, and the verdicts are just starting to come in how how serious this breach is and what can be done to prevent it. The good news is that as these exploits are discovered and analyzed by the good guys at conferences like Black Hat, the OS vendors can work to remain one step ahead of the bad guys.

Recent TMO Headlines - Updated August 28th

Sat, 1:34 AM
Tim Cook Pivots to Play Active Role in Shaping Apple Narrative
Fri, 8:35 PM
WhatsApp's New Privacy Policy is a Big Trust Killer
Fri, 3:35 PM
Soundjump Bluetooth Speaker Has Built-In Portable Charger: $104.99
Fri, 3:21 PM
How to Opt Out of WhatsApp's Facebook Data Sharing
Fri, 1:29 PM
Get Your 80s Synth on with the Stranger Things Soundtrack on Apple Music
Fri, 12:43 PM
The iPad Pro 9.7-inch Keyboard Case for Road Warriors
Fri, 11:00 AM
TMO Daily Observations 2016-08-26: Interview with Fling's Dave Hamilton
Fri, 10:00 AM
Seeing a Folder's Size in the Terminal
Thu, 7:20 PM
The Battery That's Lasted 176 Years
Thu, 6:32 PM
Enough with iPhone Headphone Jack Kvetching
Thu, 6:30 PM
How to Enable Apple Watch Screenshots in watchOS 3
Thu, 6:11 PM
Apple Patches Critical Zero-Day Data Security Exploit in iOS 9.3.5 Update
  • __________
  • Buy Stuff, Support TMO!
  • Podcast: Mac Geek Gab
  • Podcast: Apple Weekly Report
  • TMO on Twitter!