01.16.09

Gemini version available ♊︎

UNIX/Linux Offer More Security Than Windows: Evidence

Posted in GNU/Linux, Mail, Microsoft, Security, UNIX, Vista, Windows at 6:38 am by Dr. Roy Schestowitz

“Two security researchers have developed a new technique that essentially bypasses all of the memory protection safeguards in the Windows Vista operating system…”

Dennis Fisher, August 7th, 2008

Peter Kraus and David Gerard drew attention to the following interview with an author of adaware a few days ago. It explains in simple terms why Windows is inherently lacking in terms of security as it accommodates intrusion, despite all the denialist spinning [1, 2, 3]. Here is just a portion of this interview:

Eventually, instead of writing individual executables every time a worm came out, I would just write some Scheme code, put that up on the server, and then immediately all sorts of things would go dark. It amounted to a distributed code war on a 4-10 million-node network.

S: In your professional opinion, how can people avoid adware?

M: Um, run UNIX.

S: [ laughs]

M: We did actually get the ad client working under Wine on Linux.

S: That seems like a bit of a stretch!

M: That was a pretty limited market, I’d say.

Patching

Earlier in the week we found reports of new holes in Windows.

As previously announced, Microsoft has released a security update for Windows to close a total of three holes in the SMB protocol implementation. All three holes are based on buffer overflows. Two of them can apparently be exploited to inject and execute code remotely, without previous authentication. The third buffer overflow reportedly only causes the computer to reboot.

This is a lot more serious than Microsoft wants people to realise.

Microsoft Patch Tuesday bug is scary

THE FIRST Patch Tuesday fix of 2009 put out by Microsoft addresses a dangerous security vulnerability in its Server Message Block (SMB) protocol, or so say some insecurity experts

Botnets

“It is no exaggeration to say that the national security is also implicated by the efforts of hackers to break into computing networks. Computers, including many running Windows operating systems, are used throughout the United States Department of Defense and by the armed forces of the United States in Afghanistan and elsewhere.”

Jim Allchin, Microsoft

The pace of infection is very high and one worm alone is claimed to have seized millions of Windows-run computers in just one day.

The computer worm that exploits a months-old Windows bug has infected more than a million PCs in the past 24 hours, a security company said today.

One worm alone is spreading like wildfire.

Report: 2.5 million PCs infected with Conficker worm

According to F-Secure, there are already almost 2.5 million PCs infected with the Conficker worm, also known as Downadup. Since the worm has the ability to download new versions of itself, it is expected that the infection could spread much further. The new code is downloaded from domain names generated with a complex algorithm, making it hard to predict what domains will be used to spread the worms updates.

About 300 million PCs are still primed to become zombies too because of this one flaw.

With nearly a third of all Windows systems still vulnerable, it’s no surprise that the “Downadup” worm has been able to score such a success, Kandek said. “These slow [corporate] patch cycles are simply not acceptable,” he said. “They lead directly to these high infection rates.”

In general, it is estimated that 98% of Windows PCs are ripe for hijacking [1, 2].

Attacks

Is there room for some humour in all this?

Here’s a new way to get Microsoft to pay attention to you: Slip a brief message into the malicious Trojan horse program you just wrote.

That’s what an unnamed Russian hacker did recently with a variation of Win32/Zlob, a Trojan program victims are being tricked into installing on their computers.

The message is surprisingly cordial, given that Microsoft’s security researchers spend their days trying to put people like Zlob’s author out of business. “Just want to say ‘Hello’ from Russia. You are really good guys. It was a surprise for me that Microsoft can respond on threats so fast,” the hacker wrote, adding, “Happy New Year, guys, and good luck!”

E-mail

Many people remember Windows for submarines — a fiasco that reportedly led to the departure of many angry engineers. Well, not more than a month passes by and the Royal Navy, which runs Windows, gets stung by a virus infection that causes harm. Interestingly enough, the report from The Register mentions only lost E-mail as the severe consequence, but surely there is considerably more.

The Ministry of Defence confirmed today that it has suffered virus infections which have shut down “a small number” of MoD systems, most notably including admin networks aboard Royal Navy warships.

The Navy computers infected are the NavyStar (N*) system, based on a server cabinet and cable-networked PCs on each warship and used for purposes such as storekeeping, email and similar support functions. N* ship nets connect to wider networks by shore connection when vessels are in harbour and using satcomms when at sea.

It is no surprise that the United States military gradually moves to Red Hat Linux. Crucial operations were getting stung by Windows, even in the recent past.

Along with a rise of botnets, whose masters exploit vulnerabilities in Windows, comes a lot more SPAM as well. SPAM affects everyone.

The demise late last year of four of the world’s biggest spam botnets was good news for anyone with an email inbox, as spam levels were cut in half – almost overnight. But the vacuum has created opportunities for a new breed of bots, some of which could be much tougher to bring down, several security experts are warning.

This short report is based on just a few days. Nothing has improved — security-wise — in Microsoft’s product line.

“Usually Microsoft doesn’t develop products, we buy products. It’s not a bad product, but bits and pieces are missing.”

Arno Edelmann, Microsoft’s European business security product manager

Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Reddit
  • email

Decor ᶃ Gemini Space

Below is a Web proxy. We recommend getting a Gemini client/browser.

Black/white/grey bullet button This post is also available in Gemini over at this address (requires a Gemini client/browser to open).

Decor ✐ Cross-references

Black/white/grey bullet button Pages that cross-reference this one, if any exist, are listed below or will be listed below over time.

Decor ▢ Respond and Discuss

Black/white/grey bullet button If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

5 Comments

  1. Needs Sunlight said,

    January 16, 2009 at 7:39 am

    Gravatar

    I remember in 2000 when WIndows rootkits started to get popular, they’re largely ignored by the press. I’d guess they’re ignored because they bypass any and all AV software, and thus bypass the advertising money. They also go against the myth about Windows being securable that Gates folk like the public to bleat.

    Two interesting pieces:

    “Trusting Trust”
    http://www.acm.org/classics/sep95/
    alternate link:
    http://cm.bell-labs.com/who/ken/trust.html

    “Exploiting Concurrency Vulnerabilities in System Call Wrappers”
    http://www.usenix.org/events/woot07/tech/full_papers/watson/watson.pdf

    The first link, “trusting trust”, shows that no amount of bluster or bluffing can make Windows secure. Without full access to the source code for all components in the system and its applications back doors can be hidden all over.

    Two follow ups for that, also show that at the end of the day, you must have and be able to use the complete source code for the whole system and each and every component or application:
    http://www.dwheeler.com/trusting-trust/
    http://www.schneier.com/blog/archives/2006/01/countering_trus.html

    The second link, “concurrency vulnerabilities”, looks like it completely destroys the myth that add-ons can help. It *looks* like all currently existing security software for Windows can be bypassed without detection or recourse — until such time as Windows is redesigned and rewritten from the Kernel on up.

    To pick on FOSS for a bit, the first two show why the decision to tolerate BLOBs in Debian and the downgrading of the Qt license to LGPL can lead to unmitigated disasters, either through insecurity, vendor lock-in, DRM, and hardware lock-in.

  2. The Mad Hatter said,

    January 16, 2009 at 10:24 pm

    Gravatar

    As an aside, has anyone read 2003 and Beyond by Andrew Grygus? It’s one of the reasons that I started to seriously pursue an alternative to Windows (and Microsoft), and it’s an excellent evaluation of Microsoft’s plans for the years ahead (and it’s interesting to read it 6 years on, and compare what Andrew thought was happening, with what actually happened).

  3. Jose_X said,

    January 18, 2009 at 4:29 pm

    Gravatar

    [ http://cm.bell-labs.com/who/ken/trust.html Reflections on Trusting Trust ]>> The moral is obvious. You can’t trust code that you did not totally create yourself. (Especially code from companies that employ people like me.) No amount of source-level verification or scrutiny will protect you from using untrusted code. In demonstrating the possibility of this kind of attack, I picked on the C compiler. I could have picked on any program-handling program such as an assembler, a loader, or even hardware microcode.

    To add some:

    Reading source code tells all — if you trust the build system binaries that will be used to turn that source into binaries. In particular, if you have the source to the build system components, it’s easier to trust those build system binaries; however, the build system binaries have to be built themselves, this means you need an existing (simpler) build system. So do you have the source to that? And how about the source to the (even simpler) build system that built this last build system? At some point, dissembling very simple binaries upon which a multi-stage build process will occur may be what is necessary in order to gain the most trust.. or just be really sure you get your binaries from someone that has gone through that trouble. For example, the gcc system should have gone through a lot of care over the years (including back when gcc was much simpler). If gcc+co are safe, then everything else built upon it (eg, a whole distro since even other language platforms like perl, etc, could be built with gcc+co) should be as trustworthy as the sources to each of the component parts of the distro (ie, you can trust those sources that make up the distro if you trust the gcc build system).

  4. Jose_X said,

    January 18, 2009 at 4:36 pm

    Gravatar

    In the prior post, I ignored the obvious hardware issues that parallel. It’s important to at least make sure companies like AMD exist to keep Intel somewhat honest. ..AMD/Intel to keep Nvidia somewhat honest. Etc.

  5. Roy Schestowitz said,

    January 18, 2009 at 4:40 pm

    Gravatar

    You can use binary/source code signatures for your programs and compilers. Assuming your digital signatures come from a good source like CERT, then you at least have some confidence.

    Over in China, I suspect the GNU/Linux distribution they force-feed has some China-only surveillance facilities strapped onto it.

DecorWhat Else is New


  1. Links 16/05/2022: FreeBSD 13.1 and Inkscape 1.2 Released

    Links for the day



  2. Archiving Latest Posts in Geminispace (Like a Dated Web Directory But for Gemini)

    Earlier today we saw several more people crossing over from the World Wide Web to Gemini; we're trying to make a decent aggregator and archive for the rapidly-expanding Geminispace, which will soon have 2,500 capsules that are known to Lupa alone



  3. Microsoft Vidal Does Not Want to Listen (USPTO is Just for Megacorporations)

    Microsoft Vidal knows her real bosses. They’re international corporations (multinationals like Microsoft), not American people.



  4. Links 16/05/2022: China Advances on GNU/Linux and Maui 2.1.2 is Out

    Links for the day



  5. Jim Zemlin: Chief Revenue Officer in 'Linux' Seat-Selling Foundation

    Board seats in the Linux Foundation are basically a product on sale, based internal documents



  6. Reminder: Linux Foundation's Last IRS Filing is Very Old (Same Year the CFO Left)

    People really need to ask the Linux Foundation, directly, why its filings are years behind; this seems like a sensitive subject



  7. Linux Foundation Does Not Speak for GNU/Linux Users

    There's a serious problem in the "Linux" world as the so-called 'Linux' Foundation claims to speak for us (the GNU/Linux community) while in fact speaking against us (on the payroll of those looking to extinguish us)



  8. IBM's Lennart Poettering on Breaking Software for Pseudo Novelty

    Recently-uploaded ELCE 2011 clip shows a panel with Linus Torvalds, Alan Cox, Thomas Gleixner, Paul McKenney, and Lennart Poettering (relevant to novelty or perceived novelty that mostly degrades the experience of longtime users, e.g. Wayland and systemd)



  9. IRC Proceedings: Sunday, May 15, 2022

    IRC logs for Sunday, May 15, 2022



  10. Links 15/05/2022: Linux 5.18 RC7 and Calls for More Mass Surveillance

    Links for the day



  11. Audio: Mark Shuttleworth Marketed to Young Males, With Sexy Pictures

    The Web is rotting away, old links become broken links within months or years, so I’ve decided to encode a 3-minute segment of the whole as Ogg



  12. What a Difference Half a Decade Makes (When Linux Foundation is 'Having Fun')

    Media shaming campaigns may have taken their toll on the founder of Linux, who is now bossed by someone who rejects Linux and is married to a Microsoft booster. Like Richard Stallman under FSF guidance (and conditions for return, mostly for fear of further media assaults and attack dogs), he has become a more publicity-shy and private person. The Linux Foundation has in effect reduced the founder of what it’s called after (Linux) into a weekly release manager and mascot, whose brand it is gradually diluting/cheapening.



  13. Links 15/05/2022: GNU libiconv 1.17

    Links for the day



  14. [Meme] Unitary Patent and Unified Patent Court (UPC) Cannot Be Reconciled With the Law

    Unitary Patent and Unified Patent Court (UPC)? Impossible. But Team UPC counts on an endless torrent of fake news managing to convince you (and more importantly politicians) otherwise.



  15. Even Team Battistelli is Sometimes Admitting -- Out in Public! -- That Unified Patent Court (UPC) is Neither Legal Nor Desirable

    Daniel X. Thomas and other people who are “too old to punish” (consequences to their career profoundly minimised owing to seniority) are among those who push back against the Unitary Patent or Unified Patent Court (UPC); any sane person — not a career-climbing litigation zealot — can identify the pertinent facts and realise that what’s going on here is an injustice of unprecedented proportions in the patent discipline



  16. [Meme] Common Sense at EPO

    The European examiners who deal with patents prefer a system that works for science, for Europe, not for foreign megacorporations that amass millions of low-quality patents and weaponise these to discourage competition



  17. Patent Granting at the EPO Has Collapsed by 24% Owing to Much-Needed Industrial Action

    Seeing that the EPO’s management routinely violates the law and even the very legal basis of the EPO’s existence (it is a monopoly in Europe; no body has the authority to compete against it), the EPO’s examiners have embarked on a ‘Work-to-Rule’ campaign — working in compliance with the rules as defined 49 years ago and revised over the decades — and the European Patent Convention (EPC) takes priority over unlawful demands from middle and upper management; this is proving highly effective so far and it will carry on until demands are met, i.e. until the law is obeyed and staff is treated with respect/dignity



  18. [Meme] Milan is a Suburb in London

    As long as Italy is not the UK and London means London “proper” (not the French town called London) the UPCA is invalid and no matter how much Team UPC (and its puppets in EPO management) may plead, this whole system is bound to implode



  19. The Latest Propaganda Tactics of Team UPC: Pretending Unified Patent Court Already Exists and Unitary Patents Are Default When If Fact None Even Exists

    8 years ago Benoît Battistelli said that the UPC was imminent; now, after 4 years of António Campinos, it’s still not here and Team UPC speculators say it won’t happen this year, either; just like the EPO constantly lies (both to the public and to its very own staff) Team UPC continues to lie to itself (self-delusion) and to us; both also routinely break the law, engage in deliberate violations of longstanding conventions, and scrap constitutions, which in turn becomes a breaking point for the EU’s credibility and the legal profession



  20. Links 15/05/2022: More Azure Shutdowns and Windows Security Blunders Aplenty

    Links for the day



  21. IRC Proceedings: Saturday, May 14, 2022

    IRC logs for Saturday, May 14, 2022



  22. Links 15/05/2022: Pika Backup 0.4

    Links for the day



  23. Changes in the Site and the Capsule

    A 10-minute explanation of what we've been up to lately and what's changing; hopefully I'll have a lot more free time in months to come and we'll be able to produce about a dozen posts per day



  24. Links 14/05/2022: Alt Linux 10.0 Released

    Links for the day



  25. Links 14/05/2022: Builder GTK 4 Porting and Raspberry Pi Matrix Dashboard

    Links for the day



  26. Elon Musk is Right About Twitter Faking Its Importance and Using Doctored, Manipulated 'Stats' (or Bots) to Boost Valuation Based on Lies

    Today’s empirical proof that Twitter is totally faking its relevance and reach/influence, based on “Analytics” of my long-inactive account; the SEC will once again — quite likely as usual — let Musk get away with it, killing a company for personal gain as a temporary shareholder who amassed a ton of free publicity (he paid nothing at all and sent the company into a death spiral, pretty much in the same way Microsoft and Icahn did Yahoo! or Microsoft and Elop did Nokia)



  27. Who Brings Home the Bacon (Revenue), Sheela or James (Jim)?

    Sheela (yes, wife of the nontechnical Linux Foundation chief, who equates Microsoft critics with people who kick puppies) has a history working with several companies that are closely connected to Microsoft (not just Bakkt); can that be reconciled as not a conflict of interest?



  28. The 'Original' Linus Torvalds on Self-Hosting

    The fast-aging founder of Linux spoke as shown above (2005); so much has changed since then…



  29. IRC Proceedings: Friday, May 13, 2022

    IRC logs for Friday, May 13, 2022



  30. Links 13/05/2022: NetworkManager 1.38 and Pseudo-Security

    Links for the day


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts