Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Windows Operating Systems Software Security IT

Vista Protected Processes Bypassed 221

Anonymous Hero writes "Security Researcher Alex Ionescu strikes again, this time with a proof of concept program that will arbitrarily enable and foremost disable the protection of so-called 'protected processes' in Windows Vista. Not only threatening Vista DRM and friends, it's also another step towards hardened and even more annoying malware. Normally, only specially signed processes made by special companies (decided by Microsoft) can be protected, but now the bad guys can protect any evil process they want, including the latest version of their own keylogger, spambot, or worm, as well as unprotect any 'good' one."
This discussion has been archived. No new comments can be posted.

Vista Protected Processes Bypassed

Comments Filter:
  • Can we have Source? (Score:2, Interesting)

    by Anonymous Coward on Saturday April 07, 2007 @12:47PM (#18647261)
    I most certainlly hope he releases the source for this. We *know* the bad guys will invent the time to figure out how this works. Let's be on level ground, shall we?
  • Wait, wait... (Score:5, Interesting)

    by kripkenstein ( 913150 ) on Saturday April 07, 2007 @01:00PM (#18647405) Homepage

    A typical process cannot perform operations such as the following on a protected process:
    [...]
    Access the virtual memory of a protected process
    It's been a while since I knew squat about operating system internals, but aren't processes supposed to not be able to access other processes' memory anyhow? I assume, then, that this means that 'protected processes' are special in that they are also protected from any 'supervisor'-type processes, not just run-of-the-mill? In that case, are 'protected processes' meant to protect the kernel from itself, in some sense?

    Most likely I am missing the point here, and can't understand TFA accordingly. Somebody please set me straight.
  • Re:Wait, wait... (Score:3, Interesting)

    by randyflood ( 183756 ) on Saturday April 07, 2007 @01:23PM (#18647629) Homepage Journal
    I could be wrong, but I think Windows (2000, XP) generally allows processes running under the same user to look at each other's memory and such. This is useful when you want to debug a program or whatever. It's generally designed to protect users from each other, rather than protect users from themselves.

  • by Trailer Trash ( 60756 ) on Saturday April 07, 2007 @01:30PM (#18647689) Homepage
    Could this technology be used to make a file copy command for Vista that isn't dog slow? Just wondering...
  • Again? (Score:3, Interesting)

    by Proudrooster ( 580120 ) on Saturday April 07, 2007 @01:38PM (#18647751) Homepage
    VISTA hacked again? In about three years I predict this OS will actually be usable due to helper apps which allow end users to use the computer as they see fit, instead of how MS and friends think you should use it. DRM is such a waste of human resources, but I guess this is the game we have to play.

    Bill Gates wants more cheap labor [infoworld.com] to waste of useless software [theinquirer.net]. What a waste of human intellect and talent. How about making the computer RUN faster, be more intuitive, and reliable?
  • Looks like 32-bit (Score:4, Interesting)

    by figleaf ( 672550 ) on Saturday April 07, 2007 @02:08PM (#18648031) Homepage
    I would like to see him do this in 64-bit.
    32-bit allows unsigned code in kernel mode for legacy reasons so its much more easier to inject into 32-bit processes.
  • by sjames ( 1099 ) on Saturday April 07, 2007 @02:45PM (#18648407) Homepage Journal

    That's MS's big problem. A LOT of people WANT them to fail because they're MS. Because fundamentally, a computer and it's OS is supposed to do what the user wants, not what Bill Gates, the RIAA and the MPAA want it to do. There are enough people out there who know how to hack it up so it actually does do what they want. The more pragmatic ones WANT MS to fail because that's how to crack the content they want.

    Once the hacking is accomplished, a significant number of people will then abuse that code to get other people's computers to do what THEY want rather than what Bill wants (doing what the user wants is simply not up for discussion).

    The real beauty here is that the "bad guys" are turning the OS's own features against the creator (the other bad guys). The divine appropriatness of that is simply irresistable.

  • Re:In related news (Score:5, Interesting)

    by cduffy ( 652 ) <charles+slashdot@dyfis.net> on Saturday April 07, 2007 @02:47PM (#18648421)
    The only infection my home Windows system has ever had came from a MySpace page my wife was browsing. Both of us appreciate good porn, and use that system for viewing it -- and, as I said, the only infection we've ever had was from MySpace.

    The parent is not necessarily too uptight to admit surfing porn.
  • Re:In related news (Score:5, Interesting)

    by erroneus ( 253617 ) on Saturday April 07, 2007 @03:23PM (#18648821) Homepage
    I rather liken Vista to WinME. But every time I say so, someone chimes in saying Vista is the best thing Microsoft ever did or that Vista sales have set new records here or there or somewhere.

    Vista goes way ot of its way to reduce functionality for the user in order to make content providers happy. Think of what that really means. Company A sells something to Consumer A but that something is disabled in order to make Company B happy. Company B is happy because they can continue their old business model and maintain their dominance if and when they finally move into new business models when they feel ready. Meanwhile, companies C, D and E through M move to create, innovate and design new things only to be prevented by both Company A and Company B. Depending on how this is done and how much evidence can be produced, this is illegal behavior.

  • by DeadCatX2 ( 950953 ) on Saturday April 07, 2007 @04:09PM (#18649255) Journal
    When you start a process, you start it with a certain set of privileges. If you're logged on as administrator, your calls to CreateProcess [microsoft.com] can start processes with a different set of privileges.

    When you make a Windows API call to something like CreateRemoteThread [microsoft.com], you need a handle to the process you're interested in. If the right security bits aren't set (and they get set by the call to CreateProcess), CreateRemoteThread returns unsuccessfully.

    Anyway, what could you do to give debuggers special privileges that you could prevent other people from using?
  • Re:In related news (Score:3, Interesting)

    by Master of Transhuman ( 597628 ) on Sunday April 08, 2007 @12:04AM (#18652679) Homepage

    I'll tell you, personally I think porn sites don't need malware. They KNOW what you're there for - they don't need to slap adware on your system to get you to come there. I've always had some spyware protection back when I was running mostly on Windows 2000 and XP, and I surfed porn sites frequently (albeit with Opera originally and later Firefox, more than IE, so my exposure to ActiveX was minimal) and I very rarely got any spyware according to my utilities.

    Basically ANY sleazy commercial outfit will slap spyware on your system. I have clients whose kids or spouses spend a lot of time on sports sites and retailers of sport shoes - and they get tons of spyware from those sites. Porn definitely isn't the primary problem.

"Everything should be made as simple as possible, but not simpler." -- Albert Einstein

Working...