Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Microsoft Security Windows Worms News IT

Microsoft To Issue Emergency Fix For Windows .LNK Flaw 112

Trailrunner7 writes "Microsoft will issue an out-of-band patch on Monday for a critical vulnerability in all of the current versions of Windows. The company didn't identify which flaw it will be patching, but the description of the vulnerability is a close match to the LNK flaw that attackers have been exploiting for several weeks now, most notably with the Stuxnet malware. The advance notification from Microsoft on Friday said that the company is patching a critical vulnerability that is being actively exploited in the wild and affects all supported Windows platforms. The LNK flaw in the Windows shell was first identified earlier this month when researchers discovered the Stuxnet worm spreading from infected USB drives to PCs. Stuxnet has turned out to be a rather interesting piece of malware as it not only uses the LNK zero day vulnerability to spread, but it had components that were signed using a legitimate digital certificate belonging to Realtek, a Taiwanese hardware manufacturer."
This discussion has been archived. No new comments can be posted.

Microsoft To Issue Emergency Fix For Windows .LNK Flaw

Comments Filter:
  • by poptones ( 653660 ) on Saturday July 31, 2010 @06:25AM (#33094232) Journal
    My GF uses ubuntu now and she's never touched linux before about a month ago. The only thing to "learn" is to lose the bad habits you pick up from a lifetime of windows use. Just back up your music, movies and emails and reload with ubuntu. Dual booting is poison because you will inevitably boot into windows more and more often because it is familiar and "easy." Just wipe out windows, reload the machine from the ground up with linux, use it for a month and you'll never go back. If you want to play games, buy a 360...
  • by Two99Point80 ( 542678 ) on Saturday July 31, 2010 @06:38AM (#33094274) Homepage
    This is just a copy (minus links) of the article at Threatpost. How about at least crediting the source?
  • by HangingChad ( 677530 ) on Saturday July 31, 2010 @06:44AM (#33094290) Homepage

    Stuxnet has turned out to be a rather interesting piece of malware as it not only uses the LNK zero day vulnerability to spread, but it had components that were signed using a legitimate digital certificate belonging to Realtek, a Taiwanese hardware manufacturer.

    How do you suppose the crackers got a hold of Realtek's digital certificate? Seems to imply a level of sophistication that goes beyond most virus writers, many of whom are industry professionals these days. A government-backed organization maybe or well-funded industrial espionage.

    Behold the true face of cyberwar!

  • by RulerOf ( 975607 ) on Saturday July 31, 2010 @07:17AM (#33094406)

    I hear you. Those damn Linux boot loaders can be hard to get rid of.

    Indeed. I've been using SYSLINUX and COM32 for some time now and I love them to pieces. They make NTLDR, and, to a lesser extent, the Windows Boot Manager, look like kids' toys.

  • by Ilgaz ( 86384 ) on Saturday July 31, 2010 @07:27AM (#33094450) Homepage

    For some reason, MS will shy away from mandadory CRL/OCSP checks. Bandwidth issues for 1 kb traffic?

    Realtek drivers, as they are software/hardware hybrid (more like softmodem) with unneccesarry junk like an extra control panel weights around 40 MB. Everyone knows it since we have to deal with their aspx powered weirdo site when vendors, including Apple Inc. installs old version of drivers. What kind of harm would Windows do asking certificate vendor (Verisign in this case) if the certificate is real?

    This is also a mistake by Apple too, they don't enable ocsp, at least to "best attempt" in fresh OS X install. You gotta do it in keychain utility preferences. Sad that, on OS X way of doing things, that would mean an instant security boost since native OS X apps uses the same framework for SSL comms.

    Funny is, this is also a problem on Symbian which doesn't rely on "app store". For example, on Nokia E71, one must live a complete usability hell if he/she enables "online certificate revocation check". They just couldn't fix the freaking UI and disabled online certificate check for signed symbian apps. So what happens if some dumb shareware vendor loses their certificate or they actually freely sign malware? You install AV. All this for saving (!) 1 KB of traffic.

    So, even if Verisign revokes it (or hurries, whatever), it won't have any effect until MS/Apple/Symbian (don't know others) wake up and enable certificate revocation checks by default in these days even your heater is connected to the internet.

  • by alphatel ( 1450715 ) * on Saturday July 31, 2010 @07:30AM (#33094452)
    Agreed, who cares what the vulnerability is - exploits are never-ending. The digitally signed certificate is a sure-fire method of defeating a number of defense mechanisms and penetrate the MS core even further. As always, the benefit to the code writer is that any MS OS can be fooled, including server systems.
  • by orangeplanet64 ( 1381421 ) on Saturday July 31, 2010 @07:41AM (#33094492)

    If you want to play games, buy a 360...

    i want to play starcraft 2 you insensitive clod..

  • by Anonymous Coward on Saturday July 31, 2010 @07:53AM (#33094530)

    Virus authors aren't script kiddies anymore. They're trained software engineers. Remember Conficker? It had an implementation of MD6 only a few weeks after the specifications were release(It even contained a buffer overflow which was a fault in the specifications). However, to get a digital certificate signed, I'm guessing some bribery was in order. I'm guessing spam pays a lot these day, when it's done right.

  • by Jesus_666 ( 702802 ) on Saturday July 31, 2010 @07:58AM (#33094546)

    If you want to play games, buy a 360...

    How do you install System Shock 2 on an X-Box 360? There are games that aren't supported by $CONSOLE but that people still want to play.

    If you want to do dualbooting right, just move all of your data to one of the Linux partitions and erase them from the Windows partition. Then uninstall the corresponding programs. Once you're unable to check your mail/chat/etc. in Windows you'll have a much smaller incentive to stay ther for longer than neccessary.

  • by Mhtsos ( 586325 ) on Saturday July 31, 2010 @09:24AM (#33094872)

    This is especially important to anyone actually using the SCADA software this virus attacks. Some versions of WinCC are incompatible with XP (as in "only certified to run on windows 2000" i'm sure nothing technical prevents running in XP). So actually quite a large portion of the target group remains unpatched.

  • by sjames ( 1099 ) on Saturday July 31, 2010 @03:40PM (#33097036) Homepage Journal

    Fine then, the question is why doesn't MS REVOKE the Realtek cert?

    The USEFUL answer is that they did.

  • by AmberBlackCat ( 829689 ) on Saturday July 31, 2010 @08:12PM (#33098534)
    So, if they had acquired the signature for Red Hat's online repository, Fedora wouldn't be vulnerable? If the user clicks yes to accept a Fedora key, that's less risky than clicking to accept a key on Windows?

I tell them to turn to the study of mathematics, for it is only there that they might escape the lusts of the flesh. -- Thomas Mann, "The Magic Mountain"

Working...