l3lasphemer
Senior Member
- Joined
- Jan 8, 2005
- Messages
- 142
- Reaction score
- 7
Windows Vista Cracked at Security Conference
Monday, August 7, 2006 6:18 AM
Average Story Rating: Average Score
Vista was publicly penetrated by a security researcher.
So much for next generation security with Windows Vista, it looks like Microsoft is up to its old tricks again.
Not to bash on Microsoft too much, the security flaws are not bugs but instead rely on ways to get around documented features in Vista. At the Black Hat Security Conference, researcher Joanna Rutkowska exposed flaws that could potentially allow an intruder to run malicious code on a Vista system.
Windows Vista requires that all device drivers are 'signed' to prevent malicious code from posing as a legitimate driver. The researcher however demonstrated a way to load unsigned drivers.
The researcher in the second case used the virtualisation technology in a system's AMD processor to inject code into the Vista kernel. The technology would allow an attacker to create a new hypervisor that could control the operating sytem. It would remain undetected from the user and would be at the attacker's disposal.
Although she only demonstrated the attack on an AMD processor, Rutkowska said that it would also work on PCs running Intel chips.
Both attacks relied on documented features in Windows Vista and should not be considered bugs, she added.
While flaws have already been revealed on the un-released operating system, this doesn't necessarily mean that it is overall insecure. Instead, it is just not as secure as promised to be.
the link
http://www.laptoplogic.com/news/detail.php?id=1238
Monday, August 7, 2006 6:18 AM
Average Story Rating: Average Score
Vista was publicly penetrated by a security researcher.
So much for next generation security with Windows Vista, it looks like Microsoft is up to its old tricks again.
Not to bash on Microsoft too much, the security flaws are not bugs but instead rely on ways to get around documented features in Vista. At the Black Hat Security Conference, researcher Joanna Rutkowska exposed flaws that could potentially allow an intruder to run malicious code on a Vista system.
Windows Vista requires that all device drivers are 'signed' to prevent malicious code from posing as a legitimate driver. The researcher however demonstrated a way to load unsigned drivers.
The researcher in the second case used the virtualisation technology in a system's AMD processor to inject code into the Vista kernel. The technology would allow an attacker to create a new hypervisor that could control the operating sytem. It would remain undetected from the user and would be at the attacker's disposal.
Although she only demonstrated the attack on an AMD processor, Rutkowska said that it would also work on PCs running Intel chips.
Both attacks relied on documented features in Windows Vista and should not be considered bugs, she added.
While flaws have already been revealed on the un-released operating system, this doesn't necessarily mean that it is overall insecure. Instead, it is just not as secure as promised to be.
the link
http://www.laptoplogic.com/news/detail.php?id=1238