Dr. Dobb's is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Channels ▼
RSS

Security

Black Hat: Vista Vulnerable To Stealthy Malware Despite Body Cavity Search


Microsoft can add a new item to its checklist of security issues that must be ironed out before Windows Vista ships early next year. Under the right conditions, it's possible for a cyberattacker to inject arbitrary code into the Vista x64 kernel and stealthily take control of a user's system, according to one security researcher who demonstrated the process Thursday at the Black Hat conference in Las Vegas.

Joanna Rutkowska, a senior security researcher with Coseinc, presented a demo that showed how an attacker with systems administrator-level privileges could trick Windows Vista Beta 2 kernel, x64 edition, into disabling its signature-checking function and allow any unsigned device driver to be loaded onto a user's system. The danger is that the attacker can write malicious code into such a driver, which Vista would then execute.

Microsoft uses digital signatures for device drivers to let users know that the drivers are compatible with a given version of Windows. The company's goal with Vista x64 was to ensure that all kernel-mode drivers be signed, although Rutkowska showed how this mechanism could be deactivated. Rutkowska first presented her findings on July 21 at the SyScan conference in Singapore.

After the applause died down following her Black Hat demo, Rutkowska reviewed some ways to counter her attack method, ranging from forbidding raw disk access from user-mode applications to encrypting pagefile storage to disabling kernel memory paging. "That's what I'm doing in my home machine," Rutkowska said of the third option.

Although Rutkowska said Vista isn't "as secure as advertised," she added, "I think Microsoft did a good job; this doesn't mean Vista is insecure."

When asked for his reaction to Rutkowska's presentation and demo, Microsoft Director of Windows Product Management Austin Wilson said, "This is exactly why we're here at the conference."

Microsoft claims the potential to execute arbitrary code in the Vista Beta 2 kernel is a problem that's on its road map for correction, and that while the driver-signing function that Rutkowska exploited is turned on by default in the x64 edition of Vista, it's not a default setting in previous versions of Windows. Wilson said Microsoft has reached out to Rutkowska to discuss her research. Following her presentation, however, Rutkowska said she hadn't formally been contacted by Microsoft, although she has chatted with Microsoft employees about her work.

Security isn't something Microsoft has taken lightly in its next iteration of Windows. Earlier in the day, Microsoft Security Group Manager John Lambert hosted a Black Hat session that highlighted the security engineering process behind Vista. Lambert noted that Vista has been subjected to the largest commercial penetration testing effort ever. Microsoft also enlisted the help of more than 20 security researchers to give Vista a "body-cavity search," Lambert added.

Rutkowska, meanwhile, was just getting warmed up with her Vista demo. She then set her sights on AMD's 64-bit Pacifica Secure Virtual Machine technology, demonstrating how her "Blue Pill" technology for creating stealthy malware could be used to create an undetected hypervisor layer that can take control of a server's underlying operating system.

In a June 22 blog entry, Rutkowska described Blue Pill this way: "The idea behind Blue Pill is simple: your operating system swallows the Blue Pill and it awakes inside the Matrix controlled by the ultra thin Blue Pill hypervisor. This all happens on-the-fly (i.e. without restarting the system) and there is no performance penalty and all the devices, like graphics card, are fully accessible to the operating system, which is now executing inside [the] virtual machine. This is all possible thanks to the latest virtualization technology from AMD called SVM/Pacifica."

Intel shouldn't feel left out. Rutkowska said Thursday it "seems possible" to use Blue Pill on Intel's 64-bit Vanderpool virtualization technology, but added that she hadn't actually tested this.


Related Reading


More Insights






Currently we allow the following HTML tags in comments:

Single tags

These tags can be used alone and don't need an ending tag.

<br> Defines a single line break

<hr> Defines a horizontal line

Matching tags

These require an ending tag - e.g. <i>italic text</i>

<a> Defines an anchor

<b> Defines bold text

<big> Defines big text

<blockquote> Defines a long quotation

<caption> Defines a table caption

<cite> Defines a citation

<code> Defines computer code text

<em> Defines emphasized text

<fieldset> Defines a border around elements in a form

<h1> This is heading 1

<h2> This is heading 2

<h3> This is heading 3

<h4> This is heading 4

<h5> This is heading 5

<h6> This is heading 6

<i> Defines italic text

<p> Defines a paragraph

<pre> Defines preformatted text

<q> Defines a short quotation

<samp> Defines sample computer code text

<small> Defines small text

<span> Defines a section in a document

<s> Defines strikethrough text

<strike> Defines strikethrough text

<strong> Defines strong text

<sub> Defines subscripted text

<sup> Defines superscripted text

<u> Defines underlined text

Dr. Dobb's encourages readers to engage in spirited, healthy debate, including taking us to task. However, Dr. Dobb's moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing or spam. Dr. Dobb's further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | View the list of supported HTML tags you can use to style comments. | Please read our commenting policy.