Intel FDIV bug vs ILUVYOU 403
geophile sent us a really interesting comparison of the similarities and differences between Intel's notorious FDIV bug of ages past (well, at least it seems like ages) and the recent ILUVYOU macro virus. Its amusing, but at the same time
it really gives an interesting perspective on the whole deal. Hit
the link to read it
The following was written by Slashdot Reader geophile
Pentium FDIV Bug | Outlook Macro Viruses | |
---|---|---|
Nature of the bug | Loss of precision in floating point division. | Gaping security hole due to the combination of VBA scripting and Outlook. |
How to provoke the BUG | E.g. x - (x/y)*y for some x, y. | Open the ILUVYOU attachment. |
Damage caused by the bug | Probably none in practice | Millions of damaged files and registries |
Bug found by | Thomas Nicely, Math Prof | Numerous virus writers. |
Bug created by | Intel. | Microsoft. |
First response by bug's creator. | Claims the problem isn't serious. | It's a feature, not a bug. |
Second response by bug's creator. | Free replacement of faulty CPU. | It's a feature, not a bug. |
Cost to public | Probably $0 | Probably $millions |
Cost to creator of bug | $billions | $0 |
As you clean up your registry and replace your damaged files, just keep a few things in mind:
- Microsoft just wants to be free to innovate and to bring great software to consumers.
- We wouldn't have great software like Windows and Office if Microsoft hadn't violated anti-trust laws.
Re:Not quite fair (Score:2)
Just one correction here, ISP working friend of mine tells me that you don't actually have to run this particular one... the preview pane in outlook is enough to run it, apperently.
bash: ispell: command not found
Re:Not quite fair (Score:2)
There is no good reason for a foreign Visual Basic file to be allowed to run in anything but a sandbox (a la java) by default. Microsoft made a huge gaffe in putting this functionality ("innovation") into their program.
I admit that it's the user's fault in most cases "Ooo, I love you too! Let's click here!" and that most users are flaming morons, but that doesn't excuse Microsoft for making this sort of problem possible.
Re:This isn't Outlook's fault (Score:2)
Of course, anyone running an OS with such a fundamental, known WONTFIX bug is an idiot ** 10000. So, yes, Microsoft fucked up, but the person really at fault is whoever signed the purchase order for the windoze licenses. I recommend that affected organizations find and promptly sack that individual. He or she cost your company millions, not Microsoft. Microsoft just did what they do best - make it easy (for you to lose millions).
One more comparison (Score:2)
ILUVYOU: corrupts whole files completely and obviously
In a lot of areas, the former is MUCH worse than the latter. Recovering from gross damage like ILUVYOU is simple if you have good backups. Recovering from subtle damange FDIV is a little tricker... most people wouldn't even know they were affected. And that is pretty scary.
Re:Not quite fair (Score:2)
Microsoft is right. The ILOVEYOU virus isn't a software issue, it's a user education issue.
The problem is that the educated user is told to NEVER use the 'feature'. Not only does it add no value to an educated user, it REMOVES value by making them paranoid about harmless attachments like images, text documents etc.
Perhaps the best move would be to remove the 'feature' and let the user get on with life.
Re:Not quite fair (Score:2)
Arguably, the finger and sendmail problems were coding errors, not designed in per se. The problems with Outlook et al. are the result of poorly thought out and designed features. I think the latter deserves more culpability than the former.
Run as "nobody" and stop blaming :) (Score:2)
However, blaming and future suffering can be avoided simply by making mail clients etc. execute (if they have to) incoming programs as the user nobody. Of course, this requires an unix or equivalent security model; what did you expect? Of course people not knowing how to program should not have reasons to send executables to each other, but that's Just Another Flawed Thought.
Uuh, I have been talking too much about this today: distributions [slashdot.org], application-executable/x -sh [slashdot.org]. Can't help thinking it's an important subject, actually.
.
Microsoft =~ Colt (Score:2)
Both are companies whose products cause more trouble than should be fairly acceptable.
Both should be far more restricted IMHO.
There should be some limits to whom you can sell inherently dangerous products.
Re:Not quite fair (Score:2)
Re:Not quite fair (Score:2)
Re:Not quite fair (Score:2)
Hopefully, this time, somebody will be fired for buying from Microsoft...
--
Here's my mirror [respublica.fr]
Re:Not quite fair (Score:2)
Puuuuhleeeze, kids, can you read " Unsafe at any speed ", by Ralph Nader? You'll seem much less ignorant.
--
Here's my mirror [respublica.fr]
Update on Bill's reponse. (Score:2)
Re:Pointless? why isnt the media killin MS? (Score:2)
Re:One more comparison (Score:2)
Outlook 2k (Score:2)
The PINE users are also probably people that say if people used Linux they wouldn't have these sorts of problems. The people who open up attachments and forward "cute" programs or joke on AOL are the sort of people who would run around on the net as root and get themselves into trouble. One might say "well why wouldnt a Linux distro be responsible if they messed something up" and one might think they were so smart. I would simply point to the GPL "this software is provided without warrenty" to paraphrase. You're made aware that you are using GNU software with no warrenty, commercial apps (which cost beaucoup cash) do have a warrenty and therefore ought to be responsible for doing their jobs. In the case of ILUVYOU I think M$ should offer some sort compensation for people who got their system trashed. The end user needs to learn to be careful but then M$ should learn that executing scripts in e-mail by default is just asking for trouble.
Re:Not quite fair (Score:2)
The foolishness is in people enabling that idiotic setting, in MS putting the setting there, and most of all in MS making "high security" (the setting email runs under in "internet options") still capable of running javascript, cookies, vbscript, etc. I don't consider that "high security" and if MS would change that one default half of these email viruses would die oevrnight because you would have to save and execute the file as a separate step -- no double-clicking to open a script file...
MS Antivirus Gone Missing (Score:2)
Now, IIRC, Win 3.1 had a virus checker. Maybe it was separate from Windows and the PC maker included it on mine, maybe it was really a tool that MS bundled with Windows. Either way, what the fuck happened to the MS virus scanner? It seems perfectly reasonable to me that Microsoft is better equipped than anyone to protect against the potential pitfalls of their products, yet every virus scanner that they list here [microsoft.com] is a third party.
One of two things (that I can think of in the few moments that I am spending with this comment) caused MS to drop MS Anitvirus. Make that three.
This is not a problem that will go away. It is also not a problem that anyone can solve, because products will not get better until people start looking for alternatives, which they may, but don't hold your breath because (average) people don't care enough about this problem to look for an alternative. The solution to this problem in the average mind is not a secure replacement, but a band-aid that will cover it up. It comes from the notion that certain software can fix other software, the same way a certain part may fix a broken car or a certain glue may fix a broken vase. What people don't understand is that this principle doesn't apply to software. It's either good or bad and no other magic program exists that can "fix" any flaws.
This situation will not change for a long time... about a generation or so. It won't be until then that enough people understand this idea about software, or really even understand what software is. Everyone here gets it, the same way all the grease monkeys who hung out at the corner garage got internal combustion in the 1930's. It wasn't for another couple of decades that it occurred to most people that exploding gas moves some parts in the engine to make other parts spin, which spins the wheels, which moves the car. Given the rate of change in technology, I wouldn't be surprised if it took fifty years before J. Random Consumer finally knew that a program is basically a long line of data, and that there's a circuit that does what the data says to do to other data.
Is MS to blame for the security problems in its products? Yes, absolutely.
Are average people to blame for choosing that software? No. Or at least not to the extent you and I who understand the issues would be to blame for it.
FDIV bug caused failure. (Score:2)
While I'd agree the problem rarely caused problems for people, it did in at least one case cause someone (mostly me) some real grief. It also costed someone (my employer) some real money, in that I spent quite a number of hours troubleshooting the code and comparing the two machines. Given that the customer was about 800 miles away, they also incurred some additional costs in travel and shipping hardware to me for testing.
Priceless? (Score:2)
E-mail attachment file handoff.. (Score:2)
It means that you MUST have Microsoft products to read your e-mail (when someone sends you an MsWord document).
Back before Mallisa I often told people to only send me RFC text e-mail. Some were sending Netscape HTML e-mail and some were senting MsWord file attachments.
Then came the virus... now even stanch "Windows is Great" people reject file attachments and I only get RFC text. All is happy again...
The problem with Microsofts plan was multifold. The e-mail virus rummor was allready out hense the idea was allready out there.
The programs the attached files would be handed off to were NOT made with a secure environent in mind.
The Ms Word dev team expected that any given Ms Word document originated from within the office or from the same computer. Who shares wordprocessing files in the processors own specal format? No one.
The dev teams of other office applications had simmiler ideas. Files are shared inner office not nation wide. Anyone who has access to the files are by default allready inside the security loop theres no need for an additional layer.
So fire all all kinds of cool features. Gotta make a better product right?
Then comes the monster.. the feature/bug... now files are comming from OUTSIDE a security loop. Oops..
It's to late to secure the Office apps and make the network secure.
So what should Microsoft do?
Remove the stupid feature...
It isn't doing what Microsoft wanted... It will NOT lock anyone into any specal formats...
Oops!! To late.. Now Microsoft can not even to THAT.. Why?
KDE included a feature in kmail to do the same trick with a twist.. kmail passes files only to secure network applications. No passthrough to any wordprocessor.. but passthrough to RealPlayer... passthrough to PDF... passthrough to an MP3 player.. Applications expecting files from OUTSIDE a security loop so they don't have neat features that could make innocent e-mail attachments into viruses...
Also Unix apps tend to have a small note of paranoia.. Unix is a secure system and admin like to read the source code. But they don't have time to read clearly so anything that LOOKS dangerous might make an admin think twice before installing. Could start rummors... and the Internet is good for paranoid rummors..
Microsoft apps tend to have a more "feature frenzy" addatude. Don't worry about side effects just add the feature. Flood it with features. New features to the left new features to the right. Features features features. Oh and yeah and we added FEATURES...
As such most Unix apps are network secure while most Windows apps are not.
There are the few.. the proud.. the odd man out...
But it's rare...
And if there is a way to expolit a feature it is usually not known (In the case of e-mail viruses it was SOO known it's insain...) so it'll take a feald expert to find the bug and report it back.
With closed source this isn't an option. The bug will become known by a cracker and exploted...
With open source... the bug is known and fixed...
problem solved...
With e-mail viruses...
First the rummors....
Then BBS e-mail ANSI Bombs.. and the bug fixes
(In terminal programs, BBSes and in alternitive ANSI.SYS drivers...)
It was a known issue...
The first chance Microsoft gets to imbed every Windows application into e-mail they go for it.
Now every KDE application will be imbeded in e-mail... Microsoft screwed themselfs roally this time...
Re:This isn't Outlook's fault (Score:2)
.vbs = Virus Bearing Script ?
--
Just so you know (Score:2)
ONLY outlook, not outlook express.
And remember, outlook and outlook express are completely different beasts. You can't assume things about one from the behavior of the other.
Why the hell should they? (Score:2)
vbscript in windows is NO DIFFERENT than perl script.
We aren't talking about something embedded in HTML here. We aren't talking about something that needs a good security model. We are talking about something that is NO DIFFERNT than perl, or bash, or anything else.
IT WAS A RAW SCRIPT, NO DIFFERENT THAN IF I MAIL YOU A PERL SCRIPT AND TELL YOU TO RUN IT.
The only difference is the users. If I mail you a perl script, and tell you to run it, you will chekc it out first. Windows users do not have this instinct.
THIS DOES *NOT* RUN AUTOMATICALLY! THE ILOVEYOU CRAP *ONLY* SPREADS BECAUSE *IDIOT RETARD USERS* RUN IT!
Re:wrong - think Nader -v- GM (Score:2)
<<It's easy to argue that this isn't Microsofts fault, until you compare it to GM shipping products that failed so badly in crash tests.>>
In the case of things like the Melissa virus, this makes sense. But this is not such a case.
This has nothing to do with Outlook, or how it was designed.
The way ILUVYOU works is to send an e-mail with an attachment: A standalone script written in VBScript.
<<Windows can't be locked down enough to stop this stuff, ergo, it's intrinsically faulty.>>
What can you do on Linux, or Solaris to stop a malicious shell script, or Perl script attached to an e-mail?
If the recipient chooses to execute the script, then he or she will be subjected to whatever any other program can do.
The ILUVYOU script is smart enough to read Outlook's address book, but it could as easily read any other e-mail program's address book. ILUVYOU also interacts with mIRC to spread itself that way. Is mIRC at fault? Of course not.
The only "solution" would be to run every single program in the OS under a sandbox. That's not a realistic option, even if you could write a provably secure sandbox.
This worm could as easily have been a Windows EXE file. There is no functional difference here.
NT, like *nix has file ownership constraints that limit the extent of the damage that can be done. That's all that can realistically be done.
I'm not exactly a fan of Microsoft, but given that *nix is susceptible to the exact same sort of attack, I can't blame them here.
-JF
Actually, this one isn't Microsoft's fault. (Score:2)
ILUVYOU on the other hand, is a standalone VBS script. It is not part of an Office document. Being such, it really is no different than any other executable.
The ILUVYOU worm would work on any Windows based e-mail program that followed the association of
Sorry, but this one aint Microsoft's fault...
-JF
Re:Outlook 2k (Score:2)
"If a company puts a warrenty on their software they need to back up that warrenty if they didnt do what you paid them to do."
I agree fully, however...
"commercial apps (which cost beaucoup cash) do have a warrenty (sic) and therefore ought to be responsible for doing their jobs."
Oh, would that it were true...
Even if commercial apps come with a warranty, they also come with End User License Agreements (EULA) which turn right around and disclaim any liability.
And with the DMCA and UCITA, the companies are trying to codify this lack of liability (read: responsibility).
Seriously, when have we seen a case where someone who was harmed by a computer product has successfully forced the company to take responsibility? You might find a couple of such events, but I consider it unlikely.
Microsoft has built poor quality, buggy software for years that, by it's very design has security holes, is full of bugs and pretty much does whatever it (they) damn well please(s). It doesn't even do what you tell it to do, let alone what it says it will do.
I seem to remember installing Win95 and telling the installer not to install MSN... and whattya know, install is finished and there is a big shiny icon right on the desktop for MSN. And try to avoid installing IE on any of the newer products without going through the gyrations of having to download 98lite, get an old CD of 95, etc., etc.
In any other industry, lawsuits would instantly drive the company into bankruptcy. But not Microsoft (and other software manufacturers), because a shrinkwrap license and EULA says that they are not responsible.
My Win95 example is not an example of just negligence where there might be a gray area, it's out right fraud. They want you to have something on your desktop whether you want it or not. If we are a country based in law, how come someone has the ability to contract away their liability for fraud? And why aren't more people jumping up and down about it?
For example: If Ford were to manufacture a car with air bags and an explicit warning that they will go off in a front impact at 35 mph, yet they designed the system to go off at 25 mph (for the drivers safety) and they had a disclaimer (EULA) in the owner's manual that said they were not responsible if the air bag goes off at 25, would they not be guilty of fraud? Could you not sue the hell out of them?
I guess Ford hasn't given enough money to legislators to have law passed specifically exempting cars from having to perform as advertised.
Yes, some people pay for MS software thinking that they have some recourse if it fails to perform as advertised. (Others pay for it because they don't have a choice.) But of those companies which have attempted to recover damages when (note: not if, when) it fails to perform, have any actually been successful? I can't even get a refund from an OEM hardware manufacturer when I don't want to use the preloaded MS products... and can't buy their hardware without the MS product in question preinstalled.
(I know that this is changing somewhat in that I can get Linux preloaded from some OEM's but the problem is still widespread.)
In short, companies warrant software and then remove their liability in the EULA. This is the same as having no warranty at all.
At least the GPL is up front about it.
Actually, wouldn't it be at least misrepresentation if not outright fraud to state that you have rights under warranty when the EULA says that you do not?
What a sad state of affairs this is.
Russ
*sigh* (Score:2)
VBS is a scripting language, just like anything else. Java, C/C++, Perl, anything. Perhaps the outlook shouldn't run program/script files when you click on them, but it's no different then any other mail program for windows/Mac
Re:Not quite fair (Score:2)
NO NO NO and I'm using my +2 for this.
the ILOVEYOU virus requires direct user interaction. They see an icon and some text telling them to click it, it dosn't start running untill they do.
Re:Not quite fair (Score:2)
No, they made a scripting language that does this. Just like you can put an rm -rf * in a bash script file. It isn't hard. In order for ILOVEYOU to run, the user spesificaly needs to run the file themselves There isn't much MS can do about this, is there?
Re:Not quite fair - Yes, quite fair (Score:2)
This has absolutly nothing to do with the OS design, but rather with there applications. If Outlook exspress ran on linux, the exact same thing would happen.
Ask yourself this, what constructive purpose can there be for an email client that can change system files? Why should an email client be caused to generate messages by another message?
There isn't, but then, there isn't an email client that can do that on its own. ILOVEYOU is a script that is sent, allong with some text telling the user to run the script. The exact same thing could happen in Linux or any other system with scripting capablities (I could send you a shell script in an email and tell you to run it, if you were stupid, I could do basicaly anything I wanted. In fact, thats exactly what happend here)
no (Score:2)
you need to explicitly run the program by for it to do anything. Just looking at the email does not run the code!
Re:Not quite fair (Score:2)
The code in the ILOVEYOU virus is not run by default.
Re:Not quite fair - Yes, quite fair (Score:2)
Re:Funny story (Score:2)
Re:Funny story (Score:2)
Re:Enough Already (Score:2)
That's right for some home user's system. But I disagree on enterprises, they should have an admin that sets up things so that users cannot destroy anything but their own data. And their own data should be backed up automatically for them - period. The system must be idiot-proof. If you cannot do this with Windows in combination with Outlook, use something else.
Re:Run as "nobody" and stop blaming :) (Score:2)
MS Windows: less elegant than X/Motif, less stable than Mac OS. MS Windows: The choice of a foolish generation. MS Windows: You'll pity the dead. MS Windows: You can't be this bad by accident. MS Windows: Designed to lose.
Re:Not quite fair (Score:2)
-Mike
Re:Microsoft to blame? Nope, ISPs and journalists. (Score:2)
What terminal emulator are you using? Can I send you some email? There have been abuses of elm in the past and it can run code since the trojan writer has all the unix tools to play with.
How is this done?
Use escape sequence that reprograms a key (like enter?) and then send a sequence to send the message to the shell '|/bin/sh' works nice and then see what happens.
Now most terminal emulators don't have these sorts of "reprogram enter" feature but since they are in the VT100++ specs then do find their way into programs.
Re:Not quite fair (Score:2)
This is not really a Microsoft issue, frankly, in my opinion. It would not be difficult to write a Perl script which when run mailed itself to everyone in
Re:Stupid users, not stupid microsoft (Score:2)
That's a valid opinion. However, if you believe this then you *can't* tell people that UNIX is harder to use than Windows. Sure, some of the programs may take longer to learn. But almost no popular UNIX mail reader would let you execute arbitrary code by accident (and it wouldn't be running as root even if you were stupid enough to do it on purpose).
IF you think UNIX is too complicated for someone, then being happy to have them sitting one inviting click away from disaster is a big mistake.
Re:quite fair (Score:2)
Wrong. The power behind the technology that made the script so trivial is a good thing. The problem is the security model behind the technology that makes the damage possible. Remember, technology is positive when the creators put the interests of their users before their bottom line.
The real problem is Microsoft has so many apologists covering for them, they have no real incentive to put out great technology...good enough to get out the door is fine for them.
False Comparison (Score:2)
In additon to, or perhaps I should say above & beyond my loathing for Microsoft is a deep respect for sound, rational, logical thinking. And this article shows none of that. Are email macros a lame idea? Of course. Has Microsoft handled the situation badly? I wouldn't argue that. But it's inaccurate to compare Intel's bug to an exploit against Microsft's design ineptitude.
There are some interesting points hinted at here. To draw some parallels -- are gun manufacturers responsible for gun deaths? (No.) Are auto manufacturers responsible for their design defects? (Sometimes.) Are tobacco companies responsible for smoking related deaths? (Not enough, if you ask me.)
this scenario seems to fit that pattern. Under the law as I understand it (IANAL), a company is responsible for damages directly resulting from the normal their products (not sure why Colt et al get excepted from this -- probably 2nd amendment nonsense), but indirect damages or damages caused by improper use of the product are not generally a liability. All the macro-type stuff that Microsoft allows is, while colossally stupid, probably well intended. There has to be some marketing drone in Redmond that actually thinks these things are a good idea, and the fact that someone is exploiting that "innovation" maliciously is, while predictable, not something that Microsoft is really liable for.
The Intel case is a little bit different, in that under normal usage the product would cause errors. Maybe not enough for anyone to notice, maybe not enough to bring about a lawsuit someday, but enough to be noticeable under certain conditions. I think they had a little bit more to be worried about, and their PR response was the Right Thing To Do To Cover Their Asses. A parallel gesture from Microsoft would be appreciated, but I'm hardly surprised that it hasn't been forthcoming -- like I say, they seem to genuinely believe that the benefit of these extensions outweighs the considerable burden they bring.
Slashdot is getting more & more prone to encouraging this kind of rubbish. Or maybe not -- maybe I'm just starting to notice it now. But anything that plays the Party Line gets carried along (M$ bad, open sores good, hardware neutral therefore acceptable, overclocking better, ad nauseam). I just metamoderated a perfectly reasonable post about the dangers of overclocking that had for no clear reason been marked as a Troll. Why? The person was making a perfectly reasonable argument about the subject, and raised some important points. But, the Party Line was crossed, and the result was inevitable.
Like I said at the beginning, I'm as anti-Mocrosoft as any of you ("Burn Burn! Die Die!" hahaha) but give me a fscking break, guys. An article like this hardly cuts it as news. I can think of something far worse than Microsoft has ever been: the Pack Mentality. Clearly, we're hardly above that around here...
Re:Not quite fair (Score:2)
--
No more e-mail address game - see my user info. Time for revenge.
Re:Not quite fair (Score:2)
Yes, you have said it way too many times. And you have nothing to back it up. There are firsthand accounts of it happening posted here. Are you saying those people are all liars?
--
No more e-mail address game - see my user info. Time for revenge.
Re:Not quite fair (Score:2)
Yes, I know you think these can't be run automatically under any circumstances. I'll eat my words if you show me some facts to prove that.
--
No more e-mail address game - see my user info. Time for revenge.
Re:Stupid users, not stupid microsoft (Score:2)
You've honestly tried this in every single version of Outlook? Or heard from a reliable source who has?
--
No more e-mail address game - see my user info. Time for revenge.
Re:Not quite fair (Score:2)
This is false.
A proof-of-concept virus which runs when rendered in the preview pane of Outlook Express, and in the full view pane of Outlook, exists, (called Bubbleboy IIRC) but this worm has nothing to do with it. Furthermore, "all" that vulnerability allows is for arbitrary code to be saved (in plain view) into your StartUp directory to run upon reboot. In any case, MS issued a patch for this months ago.
Re:Not quite fair (Score:2)
think the latter deserves more culpability than the former.
No, they were design errors pure and simple. However, the authors of finger and sendmail ought to be cut a good deal more slack than MS, because security issues had never before been a high priority for software development, and they couldn't really be expected to foresee the types of problems a global network would expose their code to. Remember, finger and sendmail were both written to be used on internal networks of trusted clients, not on the wilds of the Internet.
In the case of Outlook, we'd had years of experience with network security for the designers to draw upon. Unfortunately, they seem to have taken the same trusting mindset which characterized the pre-worm versions of finger, sendmail, et al--which is truly inexcusable.
On the other hand, there's nothing about this worm that couldn't be replicated by a script designed for any other email program. Yes, even Pine. Someone using Pine would have to type ^S to save the attachment, and then run it from the command line, but this isn't functionally any different from clicking on the "attachments" paper clip and clicking on YOU-MUST-BE-AN-IDIOT.vbs. Everything this trojan does could be accomplished in user-space in a Unix. The only real difference is that most Pine users are smart enough not to run a suspicious script they got in their inbox.
Re:Not quite fair (Score:2)
Don't have time to find documentation, but I'm entirely positive of this.
Re:This isn't Outlook's fault (Score:2)
1. A "malicious" bash script can not make itself run as root.
The original ILUVYOU trojan doesn't do anything that would require root on a Unix. All it does is send itself to everyone in your Outlook address book (equivalent to sending itself to everyone in your Pine address book), make changes to *your* registry to run itself upon reboot (equivalent to writing a script in a user's home directory), and write itself over
The FunnyJoke variation overwrites some system files, so that would arguably need root on a Unix.
2. I believe (may be wrong on this) that the thing "looks" like a text file if you have "known extensions hidden" as per default.
If you have "hide known extensions" enabled then it looks like it's named "blahblahblah.txt". Problem is, if it was really a txt file, it would just look like "blah blah blah", since...you have hide known extensions enabled. Tricky, yeah, but not really MS's fault. Furthermore, the little icon next to it looks like a
Re:Stupid users, not stupid microsoft (Score:2)
But I don't even need to see the fact that every media source reporting the "preview pane" rumor has since retracted it to know that it's not true. I've read the damn virus code. I know how it works, and I know how the (since closed) preview pane vulnerability worked, and this simply ain't it.
Re:Stupid users, not stupid microsoft (Score:2)
Microsoft targets its products to new users, hey we were all ignorant once, I put the blame squarely on MS and the IT managers who use Exchange and Outlook for critical services. The 'stupid' user *should* be using software that is secure, false advertising and forcing users to use unsecure software at work is not their fault.
Pointless? why isnt the media killin MS? (Score:2)
Re:It's not a bug. (Score:2)
I'd like to clarify- more than "trivially easy", the Windows interface (and the WIMP interface in general) don't clearly separate the difference between opening a file and running a program. For computer beginners, this is a subtle and tricky distintion- especially with the inclusion of scripts into documents further blurring the line.
I don't know that there's just one thing to point at to blame- Microsoft's overemphasis on (and poor implementation of) "integration", poor user training, bad security settings, etc.
Re:Not quite fair - Yes, quite fair (Score:2)
alias ls 'rm -R *'
Let me explain why this is not the same.
1. This will not effect system files. (unless "I" walk away from a root login, in which case, you own the system anyway, and "I" am just an idiot.)
2. If you do something to break the system under my login, then, from an OS design point of view, it is ME DOING IT.
NO SYSTEM CAN PROTECT AGAINST A PRIVILEGED USER WITH MALICIOUS INTENT!
So the question is WHY SHOULD EMAIL ATTACHMENTS RUN PRIVILEGED BY DEFAULT.
The answer is that they shouldn't, and that allowing it is piss-poor design.
-Peter
Slashdot cries out for open standards, then breaks them [w3.org].
Re:This isn't Outlook's fault (Score:2)
1. A "malicious" bash script can not make itself run as root.
2. I believe (may be wrong on this) that the thing "looks" like a text file if you have "known extensions hidden" as per default.
-Peter
Slashdot cries out for open standards, then breaks them [w3.org].
Re:Microsoft to blame? Nope, ISPs and journalists. (Score:2)
Think about this, you recieve an HTML file from a friend. The subject line says that it's the funniest damn thing they've ever seen. How do you feel about opening it? I personally wouldn't have too much of a problem with it! It's just an HTML file. Right? Consider this, luddites (like Lars Ulrich) don't know that a
micros~1 is to blame (Score:2)
The problem is that micros~1 has no regard for the security of their users and has no security model between their mail client and their scripting language. The lack of even the most basic due-diligence performed by microsoft in this regard is abhorable and they should be punished to the maximum extent of the law.
___
Over 2 Billion? Something is wrong (Score:2)
The bottom line is this has caused more than 2 Billion dollars worldwide in lost productivity in less than a week and microsoft should be made to pay some kind of reporation for their actions.
___
Re:micros~1 is to blame (Score:2)
As other users have pointed out [slashdot.org] this is simply false. With default settings, none of these things happen. What's more is micros~1 has gone out of their way to hide the ILOVEYOU.TXT.VBS extention from the user.
Making a mail client that automaticly runs a script when the message is previewed is not a feature. The decision to implement this bug is anolgous to leaving your gas cap off the tank. Parts of the operating system are volitile when fucked with and should be treated that way.
The fact is, micros~1 used their monopoly position in operating systems to bundle explosive tools (Lookout+VBscript+windows-security) that, in the wrong hands, caused billions of dollars in lost productivity and they should be held acountable.
___
vbs IS a feature... not a bug (Score:2)
The virus could have easily been written to target UNIX users by attaching a virulant shell script that gathers adddress from the NN address book and fires them off via sendmail. It just doesn't happen because UNIX users are generally smart enough not to execute a shell script sent through a form letter without proper explanation or examining the source.
The problem here is that so many incompetant (and obviously love-starved) people use Outlook and just run whatever attachments are sent to them. As Linux builds in popularity, a trojan like this will start to affect us as well (well maybe not US, but UNIX systems).
The solution here, as always, is education of users. I don't want MS to disable
-rt-
Re:Stupid users, not stupid microsoft (Score:2)
This is quite simple not true. On a system with a concept of different security levels, the user can only affect things writeable by that user. The user could hose himself, but not the computer. As a bonus Unix mailreaders are set up by default to save executables to files, not to execute them. Some of them are set up to display DATA, but NONE are set up to automatically run powerful executables.
So no, you cannot write an effective trojan horse virus on any system. Just any system designed without ANY security concept in mind.
(2) People claim that MS Outlook's easy access to the address book is a bug. Does that also make the vast majority of unix based mail readers (pine,elm,mutt) buggy since I could easily write a trojan horse to take advantage of their address books?
Again, you CANNOT write an executable that will automatically be executed by the users of pine, mutt, and elm. Maybe you should try it. For me it goes something like this.
Step 1). Save executable to disk
Step 2). Think if there is a REALLY good reason to run the executable.
Step 3). Think about how trusted the source is.
Step 4). Delete executable.
The basic point is that the Unix mailreader is set up BY DEFAULT NOT TO EXECUTE CODE. That is a safe default, and it is one of the strong points of a SECURE operating system (see openbsd.org for discussion).
This problem has one and only one cause - an operating system and mailreader designed without thinking about security AT ALL.
As a bonus it is always fun to watch the marketing scams pulled in the aftermath of such a debacle. Microsoft KNOWS their users, by and large, will NEVER patch anything, and will NEVER change most shipped defaults. And they set up the machines insecure by default anyway.
Re:Not quite fair (Score:2)
Re:Forgot a similarity (Score:2)
hmm... good point. from now on i'm gonna have to write my virii in java
---
Re:Outlook 2k (Score:2)
Not that I think that MS couldn't have some sort of prevention for this kind of bug--instead of warning you about _every_ e-mail attachment equally, it could have the decency to not warn you that the
That aside, like I said--it's good to see someone sticking up for MS against made-up security holes.
~=Keelor
Re:Clueless MS Bashing (Score:2)
Re:no (Score:2)
Personally, I think it is shoddy programming on Microsoft's part. At least Sun had the decency to forbid Java applets from messing around with resources local to the machine they run on, such as memory and disk files. Automatically run VBScript? Fine, no problem there. Let VBScript erase files without prompting *from Outlook*? Hell no. You want to write a VB executable, let it do anything you want. But once you open up the hordes of ignorant Outlook users to this "feature," you are asking for trouble.
Re:Not quite fair (Score:2)
btw, we had more inicidents of the macro being spread by people double clicking "infected" files on networked machines that didnt even have mail clients installed. That trick of overwriting the jpg file with the script killed our technical publications department.
Paul Bryson
Pentium bug - $0 public damage? (Score:2)
Also - consider the cost of the time involved on the part of any company that sold a customer a turn-key package system based on a Pentium computer with a bad chip: that company might have had to fly a tech out to the end user to replace the chip under warranty. That is a small but non-trivial expense.
And one last note: On a SCO Unix machine running X windows, the error could be clearly seen anytime one moved the mouse - a diagonal line would appear on the screen if the mouse was moved in a certain direction (like left to right). Eventually the session looked like a copy of Space Invaders gone haywire.
Double standard (Score:2)
Re:Not quite fair (Score:2)
slashdot vs geophile (Score:2)
intention
try to stay ontopic of OSS
intention geophile: Get public's attention by posting lame comments that no one cares about,
try to stay as much off topic as possible
audience
audience geophile : Nerds (mostly)
goals achieved
goals achieved geophile : geophile's name spelled by millions of GNU/Linux users (mostly), valuable HD space wasted
usefulness
usefulness geophile : Useless, off topic
reaction
reaction geophile : lots of comments generated on Slashdot.org site
profit
profit geophile : individual satisfaction
for the future
for the future geophile : hope geophile is forced to use Windoze for the rest of his life
Re:Stupid users, not stupid microsoft (Score:2)
I think your points are valid. Despite my dislike for most things Microsoft, this situation is really the same as someone running any other executable attachment. The virus relied more on social engineering than any operating system weakness to replicate.
I took the opportunity to analyze and comment the entire virus to get a better idea of what this thing was doing to our clients. I tried to think of some things that could be changed in the Windows model to make it tougher for this type of virus to succeed, and came up with the following:
1. The operating system should minimize the kinds of things that can be done behind the user's back. One of my biggest pet peeves is the fact that Windows has several different locations for programs to be triggered at startup (including registry entries like .../Run, .../RunOnce, .../RunServices, and .../RunServicesOnce). We've got a Startup folder already; why doesn't Windows force programs to use that?
2. Users tend to be kept in the dark about important features in the Windows OS. I put IE5 on my computer at home without paying attention to the Windows Scripting Host aspect; don't you think that if another executable format is being added to my system I'd like to know about it? This is a feature I neither want nor need (and, actually, so is IE5...)
3. Crucial system features and files can be casually modified without tripping any alerts. A user on a Windows 9x system is always the equivalent of root. On Linux, you can sandbox the effects of a hostile application somewhat by running it as an unprivileged user.
4. Documents should be documents, not programs. Macros and scripts are nice, but should they really be a part of e-mail? Was plaintext e-mail such a bad thing really? :) When people get a .DOC, aren't they expecting a standard document? Really, I think much of the problem is integration where we don't need it and/or least expect it. Should a HTML page be able to access your hard drive?
The biggest part of the problem is that some users click blindly on attachments that they receive. Many use attachments as part of their job daily and still believe that attachments are only part of the document, not a separate file or executable. Education is the best answer to this, but if Microsoft worked to add better prevention and damage control to their OS we'd all be happier.
---
Re:Hmmmm... (Score:2)
Re:Stupid users, not stupid microsoft (Score:3)
A bug? Give me a break! (Score:3)
I can write a shell script that sends out billions of messages too, if you run it. I can make it attach itself to email addresses, and I can make it do it using your pine address book.
Where is the bug?
The only bug is the idiot moronic users who run attachments without knowing what they are.
Remember, ILOVEYOU does *NOT* spread on it's own, and does NOT execute automatically, and contrary to what this article says, is NOT an 'outlook macro' virus. It's just some vbscript, in a
This isn't Outlook's fault (Score:3)
Before we let MS off the hook... (Score:3)
No bug caused the m/billions to be lost, but rather a feature caused the money to float away.
Although not entirely responsible for the trojan macro, the feature is the security breach that allowed the macro to happen. Oxygen's responsibility for WWII is significantly less than this feature's responsibility for the fiasco. The proper analogy that Glowing Fish is looking for is not oxygen, but rather guns and stupid politicians.
Before I entered the IT field for real, I disliked MS but thought "Oh, what the hell." Now when I hear Gates and Co. talk about their right to innovate, I just think of this and all the other malicous macros. These are not "innovations", they are poorly planned and implemented features. These features have done far more harm to business than they have helped. I wonder about the usefulness of storing macros in normal.dot and I challenge anyone to give a good reason for including VB/A/Script in an e-mail message.
I can't help but feel as though MS's "right to innovate" has seriously limited business. Now, even small companies have to have dedicated IT departments. A mis-implemented feature causes world-wide computer havok. Promised productivity increases seem to melt away. A crash in a browser, a friggin' Internet browser, takes down the entire system. Users trying to get work done turned into beta testers so that MS can hit a product timeline. It's crazy.
And why don't the PHB take note? Because IT departments like fat budgets, and like fish, PHB like shiny things. -sk
False sense of security (Score:3)
Personally, I'm really interested in seeing if it's possible to add a 'graphic' to a vCard [imc.org] which is actually disguised VBscript. Malware that propogates via infected vCards should be able to fly under the radar for quite a while. Certainly long enough to become very, very widespread.
Re:Not quite fair (Score:3)
Under what circumstances should sendmail have a feature allowing it to automatically forward messages to everyone in
Should every installation of procmail include, by default, a well-known filter that will delete files specified by the incoming email?
If it is valid at all to design in features that permit large-scale spamming without the consent of the user, or features that will modify files without the consent of the user, is it valid to turn these features on by default, so that the least competent users are likely to be the most badly affected? How is it possible to call the ability for random strangers to delete your files "ease of use" (with a straight face)?
On a slightly gruesome note, I only wish that viruses were really as deadly as, say, ebola or bubonic plague. In that case, they might contribute to evolution--the early death of the unforgivably stupid. But that may be too harsh, and there is a good chance that the fool who designed (or ordered to be designed) such trivially easy-to-abuse features
Amy!
Re:Not quite fair (Score:3)
Where? There are no firsthand reports of this trojan running in the preview pane, and indeed there can't be, since the preview pane Outlook Express vulernability has different permissions than this worm. Specifically, a preview pane OE virus can "only" run Java Script code and/or insert arbitrary code into your StartUp directory to be run upon reboot. In any case, the source for this worm is widely available, and anyone who understands the issues involved can see that it does not run without being specifically clicked on by the user.
Finally, the preview pane vulnerability has been closed via a patch for months. Most users probably haven't applied it, but there's really nothing more MS could have done (besides not designing ActiveX so poorly in the first place).
Stupid users, not stupid microsoft (Score:3)
I see, once again, that MS is coming under fire, and probably for good reason (the address book thing is simply an error on the part of microsoft, I admit, and it shouldn't be so easily used by outside applications), but they're not the sole part of this blame.
The visual basic script is equivelent to an executable file in Windows. Most users don't see the vbs on the end, which is partly the "funny" naming convention of the file. (All bold til the extention.) People will learn from this, I hope, but then again, many people still run
I would say that if I got a file and I activated the contents, no matter what operating system I'm using. If I ran the
The blame for this falls on the shoulders of the virus (?) writer(s) and the users stupid enough to activate it. Microsoft should fix the address book thing in Outlook, but there's no security hole unless it's the one where the users brain shoulda been.
Don't gimme that "Well, if they're using windows, they're stupid users and MS should have anticipated that." They have no responsiblity if someone's a complete screw up, no more than Saturn is responsible for the girl that nearly ran me over yesterday (SEE THE STOP SIGN!)
Fully anticipating "flamebait."
Re:quite fair (Score:3)
Wrong. If you don't realize it, this is Microsoft's biggest mistake. That mistake is to make writing complex programs and wielding administrative power over computers "trivial." The ability to design complex programs with system administrative capabilities should be difficult to master. Only with experience comes responsible behavior. By tying their web browser (IE), application programming languages (VB), office automation tools (Outlook), and other sundry "features" to their monopoly operating system they make it easier for inexperienced people to write destructive programs (virus, worm, other).
I'm not strictly advocating making computer programming more difficult on purpose, but I think Microsoft went just a little too far in trusting the "average Joe" users of their software. It's like they totally ignored human nature in that there will always be a subset of society that is destructive. It's almost like putting guns in the hands of kids and saying, "You're not being fair! It's not their (those that distribute guns to kids) fault that there are some bad apples out there!"
Note that this is quite different that the current litigation blaming responsible gun manufacturers for the use of their product. We have laws that restrict the access to guns and other potentially destructive technology to responsible adults. Why don't we have the same type of rules for computer technology? What type of rules should they be? Certainly we can't limit access to computer technology to minors. That would be just plain stupid. But, how about making it illegal to have the default install state of email programs to even be able to "run" applications, at least? What about requiring manufacturers with over 20% market share in their field of endevor responsible for not fixing problems with the fundamental architecture they have designed if it shows repeated occurances of actively promoting loss of business and productivity? Especially if the loss is not limited to the individual using the product irresponsibly?
Hey. Read that over again. Sounds like that could apply to a lot of technologies and not just computers. Take car manufacturers for example. If some car maker designs a part, say a gas tank for a car, in such a way that it explodes or catches fire unreasonably often if "used" in the wrong way (such as getting in an accident, which you certainly don't try to do), wouldn't they be forced to redesign their product so that it wasn't so defective? Especially if it caused harm to those innocent people (the people in the car with the defective gas tank who got rammed from behind by no fault of their own)?
Or, take gun manufacturers, again. They certainly couldn't be sued if someone sticks a gun in their mouth and pulls the trigger. But, if a gun model routinely misfired and caused harm to the person who pulled the trigger or those nearby (but not aimed for!) there certainly would be cause for the ATF to push for a redesign (or pulling that particular model all-together).
I don't know. Sometimes I just don't understand Microsoft supporters. It's like they just don't have a clue. And this from someone who used to be an avid Microsoft supporter (in the mid-late 80's) and personally purchased many-a Microsoft C, Basic, MASM compiler/assembler.
2.61 Billion (Score:3)
One of the quotes from the article:
Microsoft is partly to blame for the bug because the company puts a priority on adding new features to its programs instead of security, said Mikko Hypponen of F-Secure Oyj, an Internet security company in Espoo, Finland. ``It's a Microsoft problem, and it's hurting them,'' he said. Microsoft's Windows operating system, used in 90 percent of personal computers worldwide, includes scripting software that allows anyone to rewrite programs. Hypponen advises most companies to get rid of the scripting software for their employees who don't need it. "
___
Blame the users, not the tool, except Microsoft (Score:3)
The only exception to this rule is a Microsoft tool.
If Microsoft writes a tool which users fuck themselves over with, Microsoft - and not the clueless users - get the blame. Why is Microsoft an exception to "guns don't kill people, people kill people".
IMHO, anybody who supports Napster on the basis that it is only a tool, yet blames Microsoft on this worm (or any other worm which was not coded within Microsoft), needs to have clues beaten into them severely, and spoon-fed to them for life.
what the heck?!?!? (Score:3)
how come everyone is saying that this isn't a problem and moderating up other folks who say that this isn't a problem?
this is a HUGE freaking problem. 60% of ALL the email systems in sweden were taken down. 30% of the email in england. All the canadian government email was taken down.
look at that. millions of people without email for a prolonged period of time and tell me there isn't a problem here.
And it isn't over yet. Everyone is looking for email with "ILOVEYOU.txt" on it but they aren't looking for the email with "warn I love you virus" as the subject. For the next couple months that's what were going to see. Except it won't be a warning. It will be the virus with a different name. Seriously. Now there are thousand of people out there who know they can disable a the email system in a school or a town or a company just by changing the subject line of the email and sending it to someone in there.
Think about a new ILOVEYOU virus every week for the next three months. Still think there isn't a problem?
but the real problem is far deeper and longer lasting. I remember when I first was introduced to email when i came to america in 96. The first question I'm asking myself is, "can't people hack our computer?" See back then I didn't know the difference between a hacker, a cracker, a hax0r, script kiddie, a virus writer, or anything. All i knew was that it didn't sound good.
The general public still doesn't fully trust computers and they trust the network even less. There are a couple people at my college whose parents didn't let them have the internet in their house.
There are many more who don't use instant messaging still because of fear of hax0rs.
Or i could rant about all the helpfull aunts out there who send people forwards with hoax email virus warnings. It's not the aunt's fault. It's the fault of negligent computer companies who allow for real email viruses. It's harder to make an email program that will allow an virus to propagate than it is to make a secure email client so they can't even claim they did it out of laziness.
It's stupid stuff like this that puts a barrier infront of people that might otherwise benifit from technolodgy.
Some of the commenters are blaming it on the outlook users. That's not very smart in my opinion. Why should the users be afraid to open attachments? Why should they be afraid to look at email. We aren't talking about email from friends as was the case with this virus. I'm talking about email from complete strangers.
I am on a couple of mailing lists and I get email from over a hundred strangers every day. But do i worry about it? NO! I just open it right up and look at it. That's because my email client will only read text and pictures. No executables. No viruses. No trojans. I can just open it up like there was nothing to it. AND THAT'S THE WAY IT SHOULD BE!!:(
Re:Not quite fair (Score:3)
No, they aren't. Just ask them what they think they're about to do before they do what you say they're doing. They're highly unlikely to say "I'm going to manually run this executable".
More likely, they'll say "I want to see what's in this file!". And that's what double-clicking an icon is for. (Except in certain contexts, when a sizable percentage presumably knows double-clicking runs a program. Reading email is clearly not one of those contexts.)
The fact that they aren't shown what's in the file, but instead have arbitrary code with the equivalent of Unix `root' privileges executed on their system, in an environment where tight integration among applications basically guarantees easy access to all sorts of personal data, makes this a highly preventable, as well as insidious, bug in the design of Microsoft software.
IMO, the biggest enabler of this bug was the decision by Microsoft, at the highest levels, to deploy Windows 9x as an "easy-to-use" OS for people wanting access to the Internet.
Even at the time that decision was made, Microsoft certainly had more than enough expertise to know it was a technically unsupportable one, from a security standpoint. I.e. they knew the Internet was hostile, that Win 9x was unsecure, that their highly integrated software made even security-by-obscurity basically irrelevant, and that their targeted user base had no expertise in securing themselves against the inevitable problems.
(At least, I really doubt I understood these issues better as a 16-year-old in the mid-'70s than the geniuses at Microsoft did circa 1995. Actually, even in the late '70s, I couldn't understand how these newfangled personal computers could fit a whole OS in 64K, until I was stunned to find out they'd ignored the whole timesharing security model. The viruses that swept the PC- and Mac-using world were never a surprise to me, of course, nor to most anyone else hacking timesharing systems before the PC generation.)
The estimates I've heard of losses are in the $Billions, but I agree Microsoft won't have to pay a dime (i.e. they won't recall Win 9x for all Internet users).
And bear in mind I'm not saying MS should have taken steps to prevent people using Win 9x for Internet use. They should have made it clear it wasn't suitable, and left it up to end users to decide whether to install 3rd-party software that let them ride the 'net. Of course, that wouldn't have earned MS the huge extra $Billions in income, or the huge additional stock valuations, which is why they didn't do the obviously "right" thing.
BTW, my wife, whose responsibilities include an IT department at the world headquarters of a well-known institution, was, needless to say, not happy about the ~36 hours of organization-wide downtime suffered due to this bug. Especially when I said "gee, don't y'all have your SMTP servers reject any incoming email that have unrecognized, or code-bearing, attachments?", she said "no, we can't make our [MS-based] software do that", and I pointed out that it was a topic often covered as being fairly easy to do on the qmail [qmail.org] mailing list. I had assumed, obviously erroneously, that last year's Melissa had convinced everyone to get their act together, disable certain kinds of attachments, etc. Not that I pay much attention to viruses: I run GNU/Linux, and use a dialup (no static IP), among many other things. The only time I see virus-protection software being run is when it's being run on someone else's computer!
Why businesses willingly pay $Millions to Microsoft so they can get "flashy" software that causes them random downtime of days per year, with "nobody to sue" as the anti-Open-Source FUD goes, is something I have yet to be able to explain using logic. (Using psychology or anthropology, however....)
Re:Not quite fair (Score:3)
Just the same way that accidental gun deaths are a user education issue. And prescription drug overdoses. And smoking-related lung cancer. And traffic accidents. All of these things could be prevented if the user just *weren't* *so* *dumb*.
Wrong. A user clicks on an email message, and their email client automatically starts running an attached file? Stupid-user or not, this 'feature' is just plain unjustified. How many seconds would you have to use up to think of a way to make this program more secure? How about prompting the user: "Run attached file: ILOVEU.VBS? (Y/N)"
Writing software that makes it easy for strangers to take advantage of the use is just plain negligent. Plenty of sensible software writers know that their software is going to be used by users of a variety of skill levels, and take this into account when writing. mIRC, for example, is set by default to decline DCC sends of .exes, .vbs, etc. This is just good sense.
Which is better, to make a program secure by default, and let users turn off security if they want? Or to make it insecure by default, and blame the users for not turning on the security?
hm.
--
Not quite fair (Score:3)
I am as anti-Micro$oft as the next red blooded American, but this is not quite fair. This table seemes to say that the bug in M$ Outlook is responsible for the ILOVEYOU virus...which it isn't. The feature or bug in M$ Outlook is there because it is supposed to be helpful (which it probably isn't), but it is not malicious, and would not causes any damage if somebody else had not tried to be malicious.
To say the bug caused billions of lost files is an arguiment of insufficient causation. It was one of the causes, but not the finishing cause, of the loss of files. Much like the presence of Oxygen in the atmosphere was neccesary for WW II to be fought, but that doesn't mean it caused World War II.
Just my $0.02 U.S.
Re:Not quite fair (Score:3)
very fair (Score:4)
The worm utilizes a known Microsoft Outlook Express security hole, Scriptlet.Typelib, so that a viral file is created on the system without having to run any attachment. Simply reading the received email message will cause the virus to be placed on the system. --from http://www.symantec.c om/avcenter/venc/data/wscript.kakworm.html [symantec.com].
Granted, this is the kak virus, and granted MS issued a patch, how long is it before someone ports the ILUVU virus to exploit this hole where the user DOES NOT NEED TO OPEN THE ATTACHMENT, just view it. Outlook and OE have horrible security. Tying the scripting language into the system was their way to make MSN as easy (sorta) to set up as AOL. Ever tried to set up MSN? Uses pervasive scripting which does not always ask for a prompt before runnning. This is not a buffer overflow error, but one (perhaps of many) exploits where windows scripting does not ask for permission to run.
Microsoft to blame? (Score:5)
Well, first ask yourself these simple questions.
Did we have these problems before Microsoft started "innovating"? I remember when people would send out warnings about "THE GOODTIMES VIRUS". We all laughed, because we knew it could never happen.
Do we have these problems now? Well, yes, many Windows users have these problems. Users of Microsoft products and products that support Microsoft "standards" are affected.
How long has this been a real problem? For at least 6 years, ever since people found out you could do this in Word 6.0 for Windows 3.1.
So what is Microsoft doing about this?
From their page [microsoft.com]:
So does their advice help any, for preventing the spread of ILOVEYOU?
No, it doesn't. ILOVEYOU sends you messages from people you trust. Why would you send a message back asking them about it? I get messages from people all the time that say "Hey, read this, it's funny." I'm not going to write them back and say "Yeah, but will it crash my computer?", because that doesn't make any sense. Macro virus protection and scanning doesn't apply here either, because Outlook doesn't even offer a warning! The user just clicks on the attachment to see what it is, like usual, and BLAM, their system is hosed. In fact, there have been some reports of Outlook opening it with the "Preview Pane" (perhaps if earier patches for Melissa weren't installed).
So, in my opinion, Microsoft isn't doing enough. They never should have created Word BASIC in the first place, they should never let what should be a formatted text file make system calls, they should never let users run everything essentially as 'root', and they should fix their software *AND* pay back the community bigtime for damages.
But hey, make your own decisions. If that wasn't enough to convince you, go read what the media has to say. I'll just sit here quietly, wondering what's wrong with the world, as my machine doesn't crash.
---
pb Reply or e-mail; don't vaguely moderate [ncsu.edu].
Re:Not quite fair (Score:5)
When we discuss the Internet Worm, for example, the blame doesn't fall totally on RTM. A sizable segment of blame goes to the authors of the finger and sendmail daemons that the Worm used to thrive and propogate. Their careless programming caused the environment, and they should have been able to recognize the danger well before RTM started to code.
So yes, I think MS does have a certain amount of responsibility. Complete responsibility? No; of course not. But let's not overlook MS for creating the environment and ignoring the danger.
This is actually why I like the comparison in this story -- both companies have responsibilities for the mistakes they made, but the intriguing bit really is the difference in handling and accepting responsibilities.
Just received ILOVELINUX.txt (Score:5)
To: black.parrot@where.ever.ur
Subject: ILOVELINUX.txt
Hi. Please type the following at your prompt -
sudo rm -rf /
Love ya,
5kr1p7
--
It's not a bug. (Score:5)
Arguable whether it's a feature, but whatever.
If I wrote a unix shell script that grepped through a user's home directory for email addresses and then used sendmail to propagate itself to those people, it would be very very similar to the love bug. The -only- significant difference is that Outlook makes it trivially easy to open and run attachments. It's a trojan horse: only works if the user actually launches it.
Feel free to lambast the intelligence level of your typical Outlook user, but pick your battles.
Re:Not quite fair (Score:5)
Outlook (when I say Outlook, I'm referring to Outlook Express 5.0, the most commonly used version and the one I have experience with) does not run this virus automatically. It cannot be made to run this virus automatically.
It DOES run embedded scripts by default, but so does any modern graphical web browser. Outlook runs embedded scripts in a secure sandbox -- they are NOT allowed to read/write files, send e-mail, etc. The ILOVEYOU virus is not an embedded script, it's an external script, analogous to a
So, to repeat again: it is NOT RUN AUTOMATICALLY. As someone said above, the only common e-mail client that can be configured to auto-execute system scripts is GNU Emacs.
This is not trolling -- this is the complete truth. And, by the way, how did a short message with no facts that was completely incorrect get moderated to +5? People really do hear what they want to hear.
Clueless MS Bashing (Score:5)
I am no great Microsoft fan. I don't despise them either. I do, however, know most of the facts in this case, and 99% of the Microsoft-bashing here is unwarranted.
First, some facts about what Outlook does. It does not claim that the file is a text file; it is displayed with the VBScript icon, and depending on system configuration, a .vbs extension. It does not run the file automatically -- users have to manually run the attachment. Even after clicking on the attachment, by default Outlook warns users that it may be a virus and the default option is to save the file, not to run it.
So, in order to be infected, users have to read the e-mail message, click on the paperclip icon to open attachments, click on the file which has a VBScript icon and usually a .vbs extension, then click "Open this" on a dialog box that warns them that the file may contain a virus. This hardly sounds like a security hole to me; it sounds like stupid users. It is basically impossible to run the virus accidentally.
The other criticism that's heard often is that users having full, root-like control is the problem. (This isn't the case in Windows 2000, by the way.) Yes, Win98 sucks, and yes, this may be a security problem, but it is completely irrelevant in this case. The virus reads your address book, sends several e-mails, then deletes certain files in the user's document directory. None of these actions would require root privileges on a system that implements them. (The virus also attempts to obtain system passwords, but this is not the part of the virus that is causing damage -- nobody has been affected by the virus obtaining passwords.)
Most of the MS bashing here is grounded in imaginary security holes. I'm not a great MS fan, and I hate Win98 as much as anyone, but if you want to criticize them, don't lie. What's being said here is worse than the stuff that Microsoft says about Linux -- at least that stuff is based at some point on facts or semi-facts.
Re:Not quite fair (Score:5)
Yes, and I guess this means we should all save passwords plaintext and in world-readable files shouldnt we? I mean, hey nothing bad will happen unless someone else has some malicious intent!
Point being, if you make software that enables a fscking email to access/erase files on your disks, and automaticly send itself onward to everyone in your address book isnt the prime cause of this? Come ON.
If you wanna compare air to something around computers, compare it to power. This wouldnt have happened without power. It's more like leaving your window open when you go to a vacation and then with a surprised look saying "hey I did nothing wrong" when you get back and nothing of value remains in your house.