03.08.09

Gemini version available ♊︎

Conficker is Alive, Windows Vista is Critically Vulnerable and Microsoft Office Likewise

Posted in Microsoft, Office Suites, Security, Vista, Vista 7, Windows at 10:01 am by Dr. Roy Schestowitz

Magaphone
Patchy Tuesdays always get you down

Summary: New evidence for the lingering pattern of vulnerability, arrogance, and lack of responsibility at Microsoft

Conficker has been a colossal PR problem for Microsoft and security headache to its customers. For the uninitiated, here are some previous posts that we wrote about Conficker:

Microsoft would rather pretend that Conficker is history, but it’s far from history. In fact, new variants of it are now appearing and Symantec has issued warnings. For the latest details, see:

i. Conficker Worm Strikes Back With New Variant

The Conficker/Downadup worm managed to slither onto millions of PCs worldwide at its height, but after it initially infected a computer it only really acted to spread itself, and didn’t cause further harm. Until now.

Symantec reports today that it has found a new variant of the virulent worm that will identify antivirus software or security analysis tools running on the infected PC, and attempt to shut down those programs. This is a strong signal that the worm’s mysterious creators haven’t abandoned their creation in the face of worldwide attention, as some in the industry have theorized, but may still have plans to make a buck off their work.

ii. Conficker gets upgraded with defenses

Researchers at Symantec have discovered what could be a significant development in the ongoing Conficker worm saga: a new module that is being pushed out to some infected systems.

In a couple of ways, the new component is designed to harden infected machines against an industry consortium that is actively trying to contain the prolific worm. For one, the update targets antivirus software and security analysis tools to prevent them from removing the malware. Not only does it try to disable anti-malware titles, it also goes after programs such as Wireshark and regmon.

It gets worse. The illusion that Windows Vista can be secured is long dead, so no update or upgrade can redeem the user from becoming a zombie (even Vista 7 is open to hijackers [1, 2, 3], long before release). It’s the same old routine now that Windows Vista is discovered to be suffering from another “critical” flaw (or set thereof) which has not been patched yet.

March’s Patch Tuesday will see yet another critical fix for Microsoft’s flagship operating systems.

Users of Microsoft Office will be left vulnerable for at least another month:

Vole said that it will not be fixing a critical Excel vulnerability, which allows attackers to launch malicious code remotely on users’ computers via an infected Excel spreadsheet file.

From IDG:

Microsoft Corp. today said it will deliver three security updates on Tuesday, one of them ranked as “critical,” but will not fix an Excel flaw that attackers are now exploiting.

All three updates spelled out in today’s notice will tackle vulnerabilities in Windows, but as is its practice, Microsoft did not drill any deeper than to specify which versions will be affected.

As usual, Microsoft is hiding the real scale and the real number of vulnerabilities. InformationWeek wrote about this also.

“Our products just aren’t engineered for security.”

Brian Valentine, top Windows executive

“It is no exaggeration to say that the national security is also implicated by the efforts of hackers to break into computing networks. Computers, including many running Windows operating systems, are used throughout the United States Department of Defense and by the armed forces of the United States in Afghanistan and elsewhere.”

Jim Allchin, top Windows executive

Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Reddit
  • email

Decor ᶃ Gemini Space

Below is a Web proxy. We recommend getting a Gemini client/browser.

Black/white/grey bullet button This post is also available in Gemini over at this address (requires a Gemini client/browser to open).

Decor ✐ Cross-references

Black/white/grey bullet button Pages that cross-reference this one, if any exist, are listed below or will be listed below over time.

Decor ▢ Respond and Discuss

Black/white/grey bullet button If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

18 Comments

  1. Jose_X said,

    March 8, 2009 at 11:41 am

    Gravatar

    “Not engineered for security” is why you have a zillion variants of bugs around. Do they “patch” one hole by moving it around to a different hiding place?

    I’m guessing their situation is horrible, but can you actually patch Windows against all the bugs at once, or will the different patches undue work done in other patches as these holes are moved around?

    [I think the answer is that the above is true for some holes but not all. When you don't engineer for security, you have to crudely keep redefining names and numbers to keep the malware guessing.]

  2. pcolon said,

    March 8, 2009 at 4:44 pm

    Gravatar

    @Jose_X: It’s sounds like the old “Whack-a-mole” game.

  3. David Gerard said,

    March 8, 2009 at 5:12 pm

    Gravatar

    The Iceland MCP story has three Slashdot firehose links – 1, 2, 3 – please vote up!

  4. Needs Sunlight said,

    March 9, 2009 at 4:35 am

    Gravatar

    One word: racketeering

    http://www.law.cornell.edu/uscode/html/uscode18/usc_sup_01_18_10_I_20_96.html

  5. Dave said,

    March 9, 2009 at 8:01 am

    Gravatar

    Wow, unbeleivable what an idiot you are Roy.
    You can’t even read the simplest of security advisories.

    The vunerability used by Conficker is NOT a critical vunerability for Vista.
    It is only critical for windows XP !!!!

    This blog is really a disgrace full of disinformation and lies !!!

  6. Dave said,

    March 9, 2009 at 8:03 am

    Gravatar

    And not to mention of course that the vunerability used by the Conficker worm has already been patched last year.

  7. Roy Schestowitz said,

    March 9, 2009 at 8:07 am

    Gravatar

    The dunce here is you, Dave.

    If you had read this post carefully, then you would realise that you are mixing together two completely isolated parts of it (Vista vulnerability and Conficker).

  8. David Gerard said,

    March 9, 2009 at 8:08 am

    Gravatar

    A patch was released, but unfortunately people don’t trust Microsoft patches any more because they accidentally break things way too often. (Not to mention deliberately sabotaging people’s machines with Windows Genuine Advantage and suchlike.)

    So people actually have to go through and check the machines. I had to do this at work (we have some Windows boxes for proprietary software that’s a required part of our production chain; we’re not happy about this). Ridiculously tedious.

    Furthermore, the patch last year only patches the Internet transmission vector for Conficker – it doesn’t actually disable the memory stick or CD vector (the autoplay problem).

    [And may I say also how much autoplay sucks. I have a 500GB drive full of ripped CDs in FLAC - I plug it into a Windows XP box and it pauses for a minute while it tries to work out how to autoplay the thing. WHAT.]

  9. Caitlin said,

    March 31, 2009 at 11:53 pm

    Gravatar

    Quite honestly, I thought it was some kind of scam for a cruel April Fools joke, but when I saw that it said in I believe, a CNN article “IF YOU RECEIVED AN UPDATE FROM MICROSOFT FOR SECURITY UPDATES, YOU SHOULD BE FINE”

    I immediately checked my Windows Update, and Lo and behold, the update was there.

    NOT INSTALLED.

    It’s now installing at 55% complete.

  10. Clump said,

    April 1, 2009 at 5:08 pm

    Gravatar

    If your computer is and has been set to automatically update then your computer itself is OK. Then you only have to worry about the systems out there holding your personal information!

    You’d think only a small percent of people wouldn’t have this patch already, but it seems about 30% of Windows users haven’t patched. North Americans will weather it better than Asians as most North American systems are patched while the big numbers of no-patch are in Asia, S. America etc.

    David Gerard Reply:

    Problem: Microsoft sends through too many patches that either (a) accidentally break things or (b) deliberately break things (WGA, which they just tried sending through again recently).

    So people just don’t trust Microsoft patches.

    Yggdrasil Reply:

    No, that is an overblown fear that some people have, but like many fears it’s irrational. Given the enormous number of Windows machines in place, problems due to updates are relatively small, though no software is perfect.

    I specifically remember trying to update a Ubuntu distro to 8.10. After it finished the machine rebooted, only to halt on the next boot complaining that it could not locate some file. Had I been using this machine for anything important, I would have been royally screwed. Updates “can” break installs or software on ANY OS. That’s the nature of computer software. Problems with Windows will always seem worse since there are more Windows machines in use.

    Try upgrading your Amiga 500 to OS 3.1, which includes having to replace a ROM chip, then find out your favorite game won’t work. Computers are complex machines. To assume you will never have problems using some other OS or hardware platform is purely delusional.

    For the record, in 12 years of using Windows machines, I have never had any update or security patch cause any serious problems. That includes the machines owned by my parents and sister. At the very worst, I might have had to update an older piece of software for some odd reason, but again…. that’s normal.

    David Gerard Reply:

    However, Microsoft really does deliberately send through patches designed to disable machines. At least when Ubuntu fucks up (and as an Ubuntu user, I am entirely too aware of how good they are at this) it’s not with deliberate malicious intent.

  11. Roy Schestowitz said,

    April 1, 2009 at 5:16 pm

    Gravatar

    People conveniently forget sometimes that this serious flaw was not supposed to exist in the first place.

    Gentoo User Reply:

    This wasn’t suppose to exist, either. But it does.

  12. jocaferro said,

    April 1, 2009 at 8:42 pm

    Gravatar

    March patch – MS09-006:
    “This security update resolves several privately reported vulnerabilities in the Windows kernel. The most serious vulnerability could allow remote code execution if a user viewed a specially crafted EMF or WMF image file from an affected system.”

    Yes, several (privately) vulnerabilities. Where?
    Windows kernel!
    2000, XP, 2003 Server, Vista.
    An unpatched Windows computer is a serious problem since the moment everyone knows about it. In the MS/Windows world this situation can take months even years until all computers become patched!
    How long MS (privately) know about this problem?
    Or, how long MS (privately) know about many problems without caring for a patch?

  13. jocaferro said,

    April 1, 2009 at 8:44 pm

    Gravatar

    ooopppss, sorry
    “2000, XP, 2003 Server, Vista.”
    – and 2008 Server too!

  14. Roy Schestowitz said,

    April 1, 2009 at 8:46 pm

    Gravatar

    Patches arrive when attacks commence.

DecorWhat Else is New


  1. The Demolition of the EPO Was Made Possible With Assistance From Countries That Barely Have European Patents

    The legal basis of today's EPO has been crushed; a lot of this was made possible by countries with barely any stakes in the outcome



  2. The EPO’s Overseer/Overseen Collusion — Part XXII: The Balkan League - North Macedonia and Albania

    We continue to look at Benoît Battistelli‘s enablers at the EPO



  3. Links 24/10/2021: GPS Daemon (GPSD) Bug and Lots of Openwashing

    Links for the day



  4. Links 24/10/2021: XWayland 21.1.3 and Ubuntu Linux 22.04 LTS Daily Build

    Links for the day



  5. IRC Proceedings: Saturday, October 23, 2021

    IRC logs for Saturday, October 23, 2021



  6. Links 24/10/2021: Ceph Boss Sage Weil Resigns and Many GPL Enforcement Stories

    Links for the day



  7. GAFAM-Funded NPR Reports That Facebook Let Millions of People Like Trump Flout the So-called Rules. Not Just “a Few”.

    Guest post by Ryan, reprinted with permission



  8. Some Memes About What Croatia Means to the European Patent Office

    Before we proceed to other countries in the region, let’s not forget or let’s immortalise the role played by Croatia in the EPO (memes are memorable)



  9. Gangster Culture in the EPO

    The EPO‘s Administrative Council was gamed by a gangster from Croatia; today we start the segment of the series which deals with the Balkan region



  10. The EPO’s Overseer/Overseen Collusion — Part XXI: The Balkan League – The Doyen and His “Protégée”

    The EPO‘s circle of corruption in the Balkan region will be the focus of today’s (and upcoming) coverage, showing some of the controversial enablers of Benoît Battistelli and António Campinos, two deeply corrupt French officials who rapidly drive the Office into the ground for personal gain (at Europe’s expense!)



  11. Links 23/10/2021: FreeBSD 12.3 Beta, Wine 6.20, and NuTyX 21.10.0

    Links for the day



  12. IRC Proceedings: Friday, October 22, 2021

    IRC logs for Friday, October 22, 2021



  13. [Meme] [Teaser] Crime Express

    The series about Battistelli's "Strike Regulations" (20 parts thus far) culminates as the next station is the Balkan region



  14. Links 23/10/2021: Star Labs/StarLite, Ventoy 1.0.56

    Links for the day



  15. Gemini on Sourcehut and Further Expansion of Gemini Space

    Gemini protocol is becoming a widely adopted de facto standard for many who want to de-clutter the Internet by moving away from the World Wide Web and HTML (nowadays plagued by JavaScript, CSS, and many bloated frameworks that spy)



  16. Unlawful Regimes Even Hungary and Poland Would Envy

    There’s plenty of news reports about Polish and Hungarian heads of states violating human rights, but never can one find criticism of the EPO’s management doing the same (the mainstream avoids this subject altogether); today we examine how that area of Europe voted on the illegal "Strike Regulations" of Benoît Battistelli



  17. The EPO’s Overseer/Overseen Collusion — Part XX: The Visegrád Group

    The EPO‘s unlawful “Strike Regulations” (which helped Benoît Battistelli and António Campinos illegally crush or repress EPO staff) were supported by only one among 4 Visegrád delegates



  18. [Meme] IBM Has Paid ZDNet to Troll the Community

    Over the past few weeks ZDNet has constantly published courses with the word "master" in their headlines (we caught several examples; a few are shown above); years ago this was common, also in relation to IBM itself; clearly IBM thinks that the word is racially sensitive and offensive only when it's not IBM using the word and nowadays IBM pays ZDNet — sometimes proxying through the Linux Foundation — to relay this self-contradictory message whose objective is to shame programmers, Free software communities etc. (through guilt they can leverage more power and resort to projection tactics, sometimes outright slander which distracts)



  19. [Meme] ILO Designed to Fail: EPO Presidents Cannot be Held Accountable If ILOAT Takes Almost a Decade to Issue a Simple Ruling

    The recent ILOAT ruling (a trivial no-brainer) inadvertently reminds one of the severe weaknesses of ILOAT; what good is a system of accountability that issues rulings on decisions that are barely relevant anymore (or too late to correct)?



  20. Links 22/10/2021: Trump's AGPL Violations and Chrome 95 Released

    Links for the day



  21. [Meme] How Corporate Monopolies Demonise Critics of Their Technically and Legally Problematic 'Products'

    When the technical substance of some criticism stands (defensible based upon evidence), and is increasingly difficult to refute based on facts, make up some fictional issue — a straw man argument — and then respond to that phony issue based on no facts at all



  22. Links 22/10/2021: Global Encryption Day

    Links for the day



  23. [Meme] Speaking the Same Language

    Language inside the EPO is misleading. Francophones Benoît Battistelli and António Campinos casually misuse the word “social”.



  24. António Campinos Thinks Salary Reductions Months Before He Leaves is “Exceptional Social Gesture”

    Just as Benoît Battistelli had a profound misunderstanding of the concept of “social democracy” his mate seems to completely misunderstand what a “social gesture” is (should have asked his father)



  25. IRC Proceedings: Thursday, October 21, 2021

    IRC logs for Thursday, October 21, 2021



  26. Links 21/10/2021: MX Linux 21 and Git Contributors’ Summit in a Nutshell

    Links for the day



  27. [Meme] [Teaser] Miguel de Icaza on CEO of Microsoft GitHub

    Our ongoing series, which is very long, will shed much-needed light on GitHub and its goals (the dark side is a lot darker than people care to realise)



  28. Gemini Protocol and Gemini Space Are Not a Niche; for Techrights, Gemini Means Half a Million Page Requests a Month

    Techrights on gemini:// has become very big and we’ll soon regenerate all the pages (about 37,500 of them) to improve clarity, consistency, and general integrity



  29. 'Satellite States' of EPO Autocrats

    Today we look more closely at how Baltic states were rendered 'voting fodder' by large European states, looking to rubber-stamp new and oppressive measures which disempower the masses



  30. [Meme] Don't Mention 'Brexit' to Team UPC

    It seems perfectly clear that UPC cannot start, contrary to what the EPO‘s António Campinos told the Council last week (lying, as usual) and what the EPO insinuates in Twitter; in fact, a legal challenge to this should be almost trivial


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts