You are here
Home › Bill Lindner › Questions Raised About Vista Security at Recent Black Hat ConferenceQuestions Raised About Vista Security at Recent Black Hat Conference
A new technique has reportedly been developed by two security researchers that bypasses all of the memory protection safeguards in Windows Vista. The tactic is expected to have far-reaching implications for Microsoft the rest of the tech industry.
Mark Dowd of IBM Internet Security Systems (ISS) and Alexander Sotirov of VMWare Inc. will discuss the new methods they've found to get around Vista's Address Space Layout Randomizations (ASLR), Date Execution Prevention (DEP) and other functions built into Windows Vista by using Java, ActiveX controls and .NET objects to load arbitrary content into web browsers during a presentation at a Black Hat briefing.
The attacks -- deemed a major breakthrough by researchers -- are not based on any new vulnerabilities in Internet Explorer or Windows Vista and there is little that Microsoft can do to address the problem because it takes advantage of the fundamental architecture built into Vista.
Dowd and Sotirov were able to load whatever content they wanted into a location of their choice on a user's machine by taking advantage of the way browsers, especially Internet Explorer, handle active scripting and .NET objects.
Almost any vulnerability in the browser is exploitable and reusable. ASLR is meant to prevent attackers from predicting target memory addresses by randomly moving things such as a process's stack, heap and libraries, and is designed to stop host-based attacks.
Microsoft Windows Server 2008, Mac OS X Leopard and Linux are also potentially vulnerable. Microsoft is aware of the research and would like to see it once it goes public, and has not responded to Dowd's and Sotirov's findings.
In another Black Hat conference presentation, Ben Hawkes explained how to conduct attacks against the Vista heap allocator, a strategy that could enable malicious hackers to compromise Windows Vista systems around the world. He reportedly presented several scenarios in which the Vista heap could be attacked in order to produce buffer overflow and execute arbitrary code.
Also at the Black Hat Conference, researcher Su Yong Kim reportedly demonstrated how developers often install program files or store sensitive data in low integrity folders in order to simplify updates. These low integrity folders don't require user agreement to access and execute the contents.
It'll be interesting to see if this will affect Microsoft's marketing based on the security of Windows Vista, since many of its built-in security features have been rendered useless.
Visit Bill's Links and More for more great tips, just like this one!
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.