Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Bug Windows Microsoft Security

Microsoft Released an Emergency Security Update to Fix Two Bugs in Windows Codecs (zdnet.com) 62

Tuesday Microsoft published two out-of-band security updates to patch two vulnerabilities in the Microsoft Windows Codecs Library, reports ZDNet: Tracked as CVE-2020-1425 & CVE-2020-1457, the two bugs only impact Windows 10 and Windows Server 2019 distributions... Microsoft said the two security flaws can be exploited with the help of a specially crafted image file. If the malformed images are opened inside apps that utilize the built-in Windows Codecs Library to handle multimedia content, then attackers would be allowed to run malicious code on a Windows computer and potentially take over the device. The two bugs -- described as two remote code execution vulnerabilities -- received patches Wednesday.

"Customers do not need to take any action to receive the update," Microsoft said.

This discussion has been archived. No new comments can be posted.

Microsoft Released an Emergency Security Update to Fix Two Bugs in Windows Codecs

Comments Filter:
  • by gweihir ( 88907 ) on Saturday July 04, 2020 @04:39PM (#60262124)

    Keeps us security experts fed nicely, but I wish we would solve real problems instead, not ones caused by continued incompetence.

    • We need a doover.

      Microsoft started off wrong and the DNA is flawed on all OSs.

      That same DNA is in the backbone of the Internet.

    • Don't worry. If MS ever gets their act together you'll still have employment from Google https://www.komando.com/securi... [komando.com], Apple https://null-byte.wonderhowto.... [wonderhowto.com], and Linux https://www.cybersecurity-help... [cybersecurity-help.cz]

      One day we may actually find that mythical perfect coder, but at present it looks like every OS has an exploit through codecs or media handling.

    • I think the problem is the facts codecs and multimedia frameworks are still written in the godforsaken programming languages known as C and C++, which is why codec libraries and multimedia frameworks are a popular target for security exploits (even open source ones which are open to wide peer review like AOSP's StageFright). But if hating on Microsoft distracts you from the fact we still rely on C and C++ despite their proven ability to produce exploitable software (when it comes to software written by fall
    • You call it crapware, I call it job security.

    • by AmiMoJo ( 196126 )

      Is Windows actually worse than other software? I mean it was back in the day but now I can't think of any similarly massive lump of code that has proven to be significantly more secure.

      Last year Linux got more CVEs and that's just the kernel.

      Seriously what are we using as the benchmark here?

      • by gweihir ( 88907 ) on Saturday July 04, 2020 @07:17PM (#60262384)

        The linux kernel has CVEs mostly in drivers. You do not need to even compile them (and if you are smart, you compile exactly what you need and nothing else...) For Windows, drivers mostly are not in the kernel. Hence the comparison is not meaningful. Also, look at CVE severity.

        • I haven't compiled a kernel in at least a decade. I used to do it for every install, but it's mostly just an extra hassle now.

          I suspect that's pretty standard.

          • Or were they stupid for using a programming language that enables a fairly innocuous mistake in a codec compromise the entire computer?

            Why would anyone use such a programming language!

            • because C is easier to program and maintain than assembly (Of course I assume you want to squeeze the last bit of juice from your metal for the given watts - else may code in java or python)
            • by gweihir ( 88907 )

              It is not the language. Buffer overflows are both easy to avoid and easy to find. If you are competent. The combination of cheap, incompetent coders and C does not go well. But neither do cheap, incompetent coders go well with any other language.

            • I'm asking this unironically and without malice or sarcasm.

              What programming language prevents security bugs?

              • Virtually every programming language other than C/++ has memory safety. So while it is certainly possible to introduce security bugs, they will generally have a distinct cause and effect. So a codec bug might prevent the codec from working properly, but would not enable arbitrary code to be run by an attacker. A bug in a login program might well compromise the security of a system, but not a bug in a codec!

                The early programming languages all had memory safety. Burroughs wrote their entire operating syst

        • Hence the comparison is not meaningful.

          Only in the eyes of a security expert. In the eyes of a user it's completely irrelevant if a "Linux" bug sits in the kernel, in a driver, or in some userland software library.

          • by gweihir ( 88907 )

            Hence the comparison is not meaningful.

            Only in the eyes of a security expert. In the eyes of a user it's completely irrelevant if a "Linux" bug sits in the kernel, in a driver, or in some userland software library.

            And if you had that thought through, you would have noticed that you are actually agreeing with me here. What counts for the user is the bugs that affect the user. Hence you must compare "Linux kernel + drivers" with "Windows kernel + drivers". Comparing "Linux kernel (including drivers)" with "Windows kernel (excluding drivers)" is invalid and not the comparison the user sees in actual usage. It is invalid in the same ways as comparing "Linux distro (including 1000's of applications)" with "Windows install

        • by AmiMoJo ( 196126 )

          In that case we probably shouldn't be counting this vulnerability against Windows either given that it's in one of the subsystems. But this is all getting rather arbitrary now and in any case Microsoft is one of the bigger contributors to Linux these days.

    • > Keeps us security experts fed nicely, but I wish we would solve real problems instead, not ones caused by continued incompetence.

      Crapware running on an Intel crap Memory Management Unit [sciencedirect.com]
  • The vulnerability is with the HEVC codecs. As far as I know these are not installed by default up to Windows 10 1903 versions. Presume they can be installed by the manufacturers with their factory installations. But then again, I always wipe those and install a clean image without the bloat and just the drivers from scratch at work. Don't you?

    • The vulnerability is with the HEVC codecs. As far as I know these are not installed by default up to Windows 10 1903 versions. Presume they can be installed by the manufacturers with their factory installations. But then again, I always wipe those and install a clean image without the bloat

      Dude... have you seen how much bloat is in a standard clean image nowadays?

      • by pmsr ( 560617 )

        Dude... have you seen how much bloat is in a standard clean image nowadays?

        Most certainly. But we live in the real world: a world of the possible, not an ideal one. And bloat, it's everywhere in this industry.

      • An HEVC decoder is... bloat? If anything, considering the patent situation around HEVC and its essentiality for things like ATSC 3.0, it's a good thing an OS-provided decoder exists in the standard image, so TV tuner software can use the OS-provided decoder and be distributed as "freeware" (free of charge is good even if the source is missing, lots of people have wallets but few people care about reading the source code) or even as windows-only FOSS. Then there is the case of smartphones recording 4K in HEV
    • We can do you one better: They actually cost money. Attempting to open a HEVC file in the default media player on Windows 10: "Films and TV" app will redirect you to the windows store to buy the HEVC Video Extensions pack for $0.99.

      It does this even if you have HEVC codecs installed and available via Direct Show, i.e. the files play fine with Windows Media Player, but the Films and TV app will attempt to nickle and dime you a bit more.

      • HEIC and HEVC are the default CODECs used by Apple.

        Perhaps that's the real reason why MS is putting up a small barrier to their easy use in Windows...

        Send a iPhone video of your kids to your Windows-victimized Grandparents: It won't "just work". Grandpa's takeaway: Damn Apple uses "nonstandard" stuff again!

        And yes, history shows MS is just exactly that petty.

        • by PPH ( 736903 )

          a small barrier to their easy use in Windows

          Yeah. We'll teach you Apple fans a lesson. We'll install something in our Windows users' systems that will let hackers pwn them. That'll teach you a lesson you'll never forget!

        • Meanwhile Linux and co. have a wonderful FOSS decoder in ffmpeg, and all the browser developers actively make it difficult to obtain or compile a browser that will support HEVC on Linux. Sure, it's a nice idea to push open codecs without patent encumbrance, but good luck getting makers of cheap SOCs to support those. And until they do it takes hours of misery and gigabytes of downloading to produce a Linux browser capable of rendering the output from a $30 Chinese webcam.
      • Still, better pay 0.99 once than multiple times I guess? It's an infrastructure other programs can use.
        • No you don't seem to understand. Windows 10's new default media player called "Films and TV" specifically does *NOT* use the infrastructure in place nor share it with other programs.

          As I said I already have HEVC DirectShow filters and codecs on the system, Windows Media Player also plays HEVC content just fine, and that's before we get into free libraries or media players like VLC which bundle their own codecs. This is literally paying 99c as far as I can see to add support for a single program.

          • Replying to self: Maybe not single program, but certainly not programs that rely on or support Direct Show.

    • The vulnerability is with the HEVC codecs. As far as I know these are not installed by default up to Windows 10 1903 versions. Presume they can be installed by the manufacturers with their factory installations. But then again, I always wipe those and install a clean image without the bloat and just the drivers from scratch at work. Don't you?

      They're installed manually, via the Windows Store. So probably almost nobody has them installed.

      That's why they're patched via the Windows Store, not Windows Updates.

      As for factory images, these days I've found both Dell and Lenovo are pretty close to clean for business-class machines. Both include their driver/firmware update tools, and Office 365 preloads, but that's about it. Most of my customers use other various Office licenses (volume license, product key cards) but removing the O365 preload i

  • Jesus fuck. Another emergency update? Microsoft is sinking fast. Abandon ship!
    • What's interesting to me, (I'm retired IT) is that Microsoft could slip something in through the Store.

      Especially on a goddam server!

      • It's called an auto-update for an application. It has been common to "slip" these in since the internet was invented.

        This isn't a Windows vulnerability. It's a vulnerability in the HEVC Video Extensions package that users would need to buy from the store. The only thing being slipped here is a standard app update with the vulnerability fixed.

  • Customers do not need to take any action to receive the update

    So this is why my computer woke up and rebooted itself off schedule.

    • No reboot required.

      We would still be hearing about lawsuits from those running Server 2019.

    • No. These updates are not delivered through Windows Update and do not require a reboot. They are delivered as Windows Store patches as only one specific Store app is affected, specifically the HEVC Filters. If you haven't purchased those for 99c, then you wouldn't even get this update.

  • by backslashdot ( 95548 ) on Saturday July 04, 2020 @07:28PM (#60262400)

    "Customers do not need to take any action to receive the malware," hackers said.

  • "The Most Secure Windows Ever!"

  • What's your point of NOT including any actual info in the article? Oh, it's so incredibly dangerous, yet you won't even say WHICH IMAGE FILE FORMATS? No, I don't feel like checking the links you included. You took out that desire from me, by posting this joke of an article.
    • No, I don't feel like checking the links you included.

      If you want to be spoon fed go cry to your mommy.

  • Entire shell crashes when trying to print.

For God's sake, stop researching for a while and begin to think!

Working...