Windows .ANI Problem Surfaced Two Years Ago 110
An anonymous reader writes "There's a new twist to the tale of Windows .ANI exploit, that's been in the news all week (including when a spam campaign used the teaser of nude Britney Spears pictures to lure people to malicious sites). InformationWeek reports the Windows .ANI bug at issue first surfaced — and was patched — two years ago, in early 2005. 'If they had simply looked for other references for the same piece of code when they originally dealt with it a few years ago, they would have found this and patched it in 2005,' says Craig Schmugar of McAfee. 'It would have saved a whole lot of people a lot of time, money and effort.' Microsoft claims this .ANI vulnerability is different from the old, but beyond that they're not talking."
How is that a lure? (Score:5, Funny)
Talk about an anti-virus.
If all attempts to hijack my machine involved using her as a lure, I'd uninstall AVP in a heartbeat; you couldn't pay me to see her nude.
Re: (Score:2, Funny)
Re: (Score:2)
Re:How is that a lure? (Score:5, Funny)
Strange... (Score:4, Funny)
Re: (Score:3, Informative)
Actually, the ANSI sequence 'viruses' (which were done by remapping keyboard keys to macro sequences which then executed commands) are just another form of terminal sequence attack that was quite popular a few years back when many people were still using terminal-oriented mail readers like pine, elm and mutt. These were the good ol' days when ISPs passed out shell accounts for reading mail and such. It forced Linux distros to shor
Re: (Score:1)
a-HA! (Score:2)
So now we can say that Windows actually had twice as many ANI bugs as we originally thought and Microsoft admitted so themselves.
Wouldn't that be (Score:5, Funny)
Re:Wouldn't that be (Score:5, Funny)
Oblig. (Score:2)
Hello, Mr. Potato Head! Back doors are not secrets!
Nothing to see here.. (Score:2)
This ANI exploit is different! (Score:5, Funny)
Of course this
Incompetent Liars (Score:5, Insightful)
If you read the slashdot summary (or even the whole first page of the article), you get the impression that some people think the bug is pretty much the same thing as the 2005 one and that Microsoft disagrees. The story is structured like a "He said, she said," kind of thing and no one is painted as right or wrong. If you *do* manage to make it to the second page of the article however, you find out that several very respected security professionals and security companies present detailed compelling evidence to the effect that Microsoft is both incompetent and disingenuous in their opinion on this bug.
It is the same bug (essentially) reported in 2005, and it should have been caught in a matter of hours or even minutes after the 2005 bug was initially reported to them. This by reason of Microsoft's own self-stated bug hunting and code modification procedures.
The conclusion is absolutely inescapable that Microsoft completely failed to follow their own basic rules of coding and security auditing here. They also are lying or at the very least splitting hairs about it being a "separate issue," and they seem to be deliberately trying to pull the wool over peoples eyes about it. Yet this story has been reported around the web as a kind of "maybe McAfee is right, or maybe Microsoft is right," thing for the most part??? Why?
On top of all of that, this is yet another (of about three instances I have found so far), where it's clear that Vista is not "all new code" as MS likes to maintain it is. It seems like this bug occurred because the same old *.ani code from the previous versions of MS Windows was included in Vista with literally no oversight and no checking.
Why do people buy products from these people again?
And why do they always seem get the benefit of the doubt in the media?
Re: (Score:3, Insightful)
Re: (Score:2)
If so there is no slander or libel. (A court ordered apology and forced publication of a correction in the same media that the initial comment was made may still be required, however).
-nB
Re: (Score:3, Interesting)
Well, considering the mount of dialog boxes kept unchanged from XP and all, it seems pretty obvious that Vista is not "all new code". And what would be the point, as
Re: (Score:2, Offtopic)
It is the same bug (essentially) reported in 2005, and it should have been caught in a matter of hours or even minutes after the 2005 bug was initially reported to them.
Do you write code? It sounds like some copy-and-paste code had a bug in it, and they didn't catch both places. They probably should have caught it, but they didn't. If they are incompetent merely because they have code that is exploitable by stack overflow
Re: (Score:2)
Re: (Score:2, Insightful)
Re:Incompetent Liars (Score:5, Insightful)
I'll just assume your case is the latter
Sure, copy-and-paste duplication should be avoided where possible, along with gotos, reinventing the wheel, long complicated functions, lack of type safety, etc.
Also, all code should really be a perfect and pristine example of elegance and modularity. Bug-free is even better!
Reality bites, though.
Unless we're talking of brand-new projects of a small size, I find it really hard to believe that comminiting to 0% copy-and-paste-code is a practical proposition.
For a non-trivial product with some legacy, copy-and-paste is often the best among various non-optimal choices.
- Do you really want to tightly couple these two unrelated components because you want to use those 5 lines of code?
- Can you afford to carry over all of the dependencies on that library or class?
- Or can you afford the refactoring to avoid those dependencies? How many new components (which were not changing before) do you need to retest now that you pulled the code out?
- Can you afford to lose that development and testing time on other features that you need for RTM?
That's not to mention the almost-guaranteed design time discussing where that re-usable code should move to in the first place... and do we need to change it to make it more generic? Do we need to ship all the refactored components with no functionality change? etc. etc.
I agree with the sentiment: Copy-and-paste duplication sucks, and should be avoided wherever possible.
But honestly, if you can ALWAYS say that avoiding copy-and-paste at all costs is the right decision for your product, for your team, and for yourself... I don't know whether to envy you, or to fear you.
Re: (Score:2)
Re: (Score:1)
Do you really know such a manager? My experience with manager is tha
Re: (Score:2)
His trust in us has really paid off
Re: (Score:1)
However, he majority of project managers is incompetent. 90% of those I know got their position because they were loud mouthed, brown nosing morons, which where unable to write reliable code or perform well with whatever job the initially had. One department is really glad to get rid of them, the
Re: (Score:1)
You forgot the third possibility: An experienced coder, who was responsible for such a design flaw himself and was seriously bitten by it.
On the contrary, I'd say in a small project you can get away with code duplication. And there is nothin
Re: (Score:2)
Which incidentally, was the whole point of the comment.
Re: (Score:1)
I don't think I misunderstood you. But I think I made it not clear enough that I disagree. If you are a developer with no managerial functions, there is one decision, which is as close a ALWAYS right as a decision can come: Design as clean as you can. No shortcuts ever. If you think your code needs a refactoring, do it. If it means missing a schedule
Re: (Score:2)
Re: (Score:1)
How many parameters does this function have? That's to say how many bugs we can expect in this one function in the future?
Re: (Score:2)
FYI, another
Re: (Score:2)
Real engineering sucks, doesn't it?
Re: (Score:3, Insightful)
Why do people buy products from these people again?
Because (overall) it just works, and has incredibly good hardware support.
It also is aesthetically pleasing. While there has been lots of effort put into making things like KDE look good, the individual shiny buttons and bars don't agree with a universal theme. Windows development is centralized, so the everything fits together visually.
I personally prefer the look of Windows XP to any OS (note I haven't used Vista), just because the gradients, buttons, and esp the fonts all fit together smoothly.
Re: (Score:2)
Re: (Score:2)
Sadly, the uniform look&feel of Windows has been slowly becoming worse in rec
Re: (Score:2, Insightful)
Re: (Score:2)
Re: (Score:2)
And that bit about the security experts not knowing what they are talking about because they don't have the source code, well they have the binary code and from that they can generate assembly code. With that, it's pretty easy to see if an unchecked pa
Re: (Score:1)
Re: (Score:1)
Further if you have any idea of what is involved in backwards compatability (ref: Raymond Chen's blog) then you'll understand how reluctant Microsoft may be to change even such a small thing as that.
It's a nice rant you
Re: (Score:3, Interesting)
Re: (Score:3, Interesting)
Re: (Score:2)
Here's a plausible version of what happened (Score:3, Informative)
nothing to see here... ssdd... remember winnuke? (Score:1)
Out of interest.... (Score:5, Funny)
Re:Out of interest.... (Score:5, Funny)
Re:Out of interest.... (Score:5, Funny)
Re: (Score:2)
Re: (Score:2)
Fitting (Score:2)
Meh (Score:1)
I can see two seperate bugs causing the same result, I've dealt with it tons of times.
"the bug is back, you didn't fix it"
and I say, "no this one is different"
Meh
Who really fucking cares?
Re: (Score:2)
Guess what company famous for stealing software, lying about its security, famous for hiding "features" that deliberately break interoperability doesn't want to expose its c
useless (Score:3, Insightful)
Re: (Score:2)
It would be nice to have real information on this (Score:2)
Re: (Score:3, Informative)
Does anyone have a link to any information that actually explains how thi exploit works?
Here you go: Analysis of ANI "anih" Header Stack Overflow Vulnerability [mnin.org]
Basically, an animated cursor is just one way to exploit a problem with Windows' GDI (graphical device interface) implementation. Windows runs this as part of the user's session and it is, in part, in kernel mode. Just like Jon Ellch and David Maynor showed with the Apple wireless driver exploit, if you can get access to the kernel, you can do pret
Ban C (Score:2)
You've rather eloquently stated the reason why average programmers shouldn't be allowed to code security-sensitive code in the C family of languages.
Everybody gets this wrong. The argument is always for performance. Well, a Windows machines overridden by spyware is just as slow as if the whole userland were written in c#, so I'm not buying that one. "Not even Microsoft" can get security right in C++. The quotes are there not because I e
Re: (Score:2)
Re: (Score:2)
Observations: If DEP/the NX/XD bit was actually turned on on Vista or XP by default, this would have no effect.
Bit dissappointing that Firefox falls for this too. I REALLY DON'T WANT Firefox to support animated cursors....
Re: (Score:2)
If DEP/the NX/XD bit was actually turned on on Vista or XP by default, this would have no effect.
Would it? I am not so sure. DEP protects against execution from the stack. Instead, this exploit uses jmp (jump) to make calls against user32.dll. This is a different animal than what DEP is designed to catch.
J Wolfgang Goerlich
Re: (Score:3, Interesting)
This is why I've been saying this problem has NOT been caused by a mere "bug in the code". Bugs happen to everyone, and it's not about blaming people. It's an accident.
But this issue has not been caused by a mere bug. It's been caused by a catastrophic design flaw in Windows itself (which I persona
Re: (Score:1)
It kind of depends on your definition of "taking control of your computer". If you mean that exploiting a cursor library alone won't let you gain root, that is true as libraries don't run with that sort of privilege. However, if you were to define "control of your computer" as being able to delete all your data, set up a spambox or an irc/web/ftp server on your machine and so on, well that's quite possible, given that these libraries run with user privileges.
The problem is that, in practical terms
Re: (Score:2)
On my machine (I am the only user), you're right. Anything getting full user powers could run servers, access/modify/delete all my documents and so on. To fix it, yeah I'd have to wipe my user and start again. But I'd only have to wipe my user. I wouldn't have to reinstall all my apps and reconfigure the machine.
And your second point is that they could find an expl
Re: (Score:1)
I was thinking specifically about rootkits [wikipedia.org]. My point is that while in theory that's how it works (normal users don't have root priviliges, end of story) the reality of things is a bit different. In
Re: (Score:2)
I understand that any one hole in a system means people can flow through. But I thought the point was that the ENTIRE system was designed from the ground up with this in mind, so that there are literally very few places to poke holes in (and those places are highly checked for security).
Re: (Score:1)
As far as I know, as I'm no researcher in the field, security is a bit of a state of mind. It's mostly a measurement of how much time and effort/money you're willing to invest in it; you can code for it in your specs, but it'll depend on how much time you put into debugging it (which, in turn, has diminuishing returns as time wears on: you
Re: (Score:2)
Re: (Score:3, Informative)
Re: (Score:2)
You know, if Microsoft can pay a dozen people to make sure a reporter writes THEIR story and not his/her own, you'd think they'd be paying developers enough and putting enough "process" in place in order to make the product better. But here in 2007, it sure looks like they still suck at software engineering.
LoB
ASUS website hacked (Score:1)
http://www.infoworld.com/article/07/04/06/HNasuste ksitehack_1.html [infoworld.com]
Although I never visited the site because it was slow to begin with and had the worst download rates.
Netcraft says for the asus.com website that it was running Windows Server 2003 but other foregin ASUS sites were running a mix of Linux/BSD.
Re: (Score:2)
Aha!
I had always wondered why the non-US ASUS sites were so good but the "actual"
Re: (Score:2)
Ask anybody about what OS was the base of an attack which makes the press and you get no answer...
I can only imagine that someone is very persuasive at keeping this quite since there is just too much consistency in how these requests are handled.
Atleast now we know ASUS was/is Microsoft Windows.
LoB
Re: (Score:2)
LoB
Cut it out (Score:5, Funny)
Steve, leave the slashdot editors alone. If you need to blow off steam, go throw a chair or something.