Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Microsoft Bug Open Source Operating Systems Security Windows

Microsoft Modifies Open-Source Code, Blows Hole In Windows Defender (theregister.co.uk) 71

An anonymous reader quotes a report from The Register: A remote-code execution vulnerability in Windows Defender -- a flaw that can be exploited by malicious .rar files to run malware on PCs -- has been traced back to an open-source archiving tool Microsoft adopted for its own use. The bug, CVE-2018-0986, was patched on Tuesday in the latest version of the Microsoft Malware Protection Engine (1.1.14700.5) in Windows Defender, Security Essentials, Exchange Server, Forefront Endpoint Protection, and Intune Endpoint Protection. This update should be installed, or may have been automatically installed already on your device. The vulnerability can be leveraged by an attacker to achieve remote code execution on a victim's machine simply by getting the mark to download -- via a webpage or email or similar -- a specially crafted .rar file while the anti-malware engine's scanning feature is on. In many cases, this analysis set to happen automatically.

When the malware engine scans the malicious archive, it triggers a memory corruption bug that leads to the execution of evil code smuggled within the file with powerful LocalSystem rights, granting total control over the computer. The screwup was discovered and reported to Microsoft by legendary security researcher Halvar Flake, now working for Google. Flake was able to trace the vulnerability back to an older version of unrar, an open-source archiving utility used to unpack .rar archives. Apparently, Microsoft forked that version of unrar and incorporated the component into its operating system's antivirus engine. That forked code was then modified so that all signed integer variables were converted to unsigned variables, causing knock-on problems with mathematical comparisons. This in turn left the software vulnerable to memory corruption errors, which can crash the antivirus package or allow malicious code to potentially execute.

This discussion has been archived. No new comments can be posted.

Microsoft Modifies Open-Source Code, Blows Hole In Windows Defender

Comments Filter:
  • by Required Snark ( 1702878 ) on Thursday April 05, 2018 @10:01PM (#56390531)
    Mass search and replace with no testing. A complete lack of understanding of simple principles of numeric comparisons. Not knowing the difference between unsigned and signed integers.

    Sounds exactly like standard operating procedure at Microsoft.

    Microsoft: bringing the Blue Screen of Death to Open Source Software since 2015.

  • by davidwr ( 791652 ) on Thursday April 05, 2018 @10:21PM (#56390587) Homepage Journal

    Nothing to see here.

    Someone at MS modified code without understanding all the implications, and/or they modified code and someone else at MS called the code without being aware of the modification.

    "Forking open source code" could just as easily been "bought closed-source project from third party them modified it," "hired contractor to write a library then modified it," or "forked code from another MS project then modified it."

    • Re: (Score:2, Insightful)

      by Anonymous Coward

      Nothing to see here.

      Someone at MS modified code without understanding all the implications, and/or they modified code and someone else at MS called the code without being aware of the modification.

      Yep, nothing to see here. People at MS take code and modify it without understanding about integer overflows and signing conversion. It's not like that code goes into anything important used on billions of devices that could be exploited by mere exposure to a certain crafted filetype that mere possession should

    • Except the open source part meant: 1) They could make the modifications, 2) they could share those modifications, 3) the maintainer (or anyone competent) could have vetted and merged the changes, 4) there was no need to make the changes.

      The breakage in this case happened because they made the change carelessly and chose not to participate in the usual quality control. And it caused a major security flaw in the program they force on users specifically for security. I'll grant you the situation would be no be

    • by sad_ ( 7868 )

      except for the fact that MS is using OSS in their products. OK, that is nothing new, but worth repeating.
      the other news is ofcourse they are using it wrong and thus introducing errors/bugs into their products.
      and lastly, the headline makes it sound as-if it's all the fault of OSS, while the opposite is true.

  • by Ol Olsoc ( 1175323 ) on Thursday April 05, 2018 @10:33PM (#56390625)
    This is a Microsoft product. So it is no surprise. Benn a very insecure week for them. But they are getting better at simply inviting the bad guy in. Black Hats are thankin' ya Mister Nutella.
  • GPL Violation? (Score:2, Flamebait)

    by hackel ( 10452 )

    It seems like the bigger story here is that Microsoft has included code from the GPL-licensed unrar in their Windows Defender product, without releasing the full source code as required by the license agreement. Am I missing anything? The FSF needs to go after them for this!

    • Re: (Score:2, Informative)

      by Anonymous Coward

      Unrar is not GPL licensed. Its freeware.

      • I always thought it was a good thing that Microsoft got BSD networking code. The GPL(s) really aren't suited for infrastructure code.

    • Maybe they used a version with a license similar to this one [github.com].

    • Am I missing anything?

      You are. unrar's source is licensed under either a BSD-like license, or the GPL, your choice.

      • by tlhIngan ( 30335 )

        You are. unrar's source is licensed under either a BSD-like license, or the GPL, your choice.

        Or... neither?

        Looking at the official UnRAR source code (from https://www.rarlab.com/rar_add... [rarlab.com] ), the license.txt is really a BSD-ish style license. No GPL at all. Basically you can use it to handle RAR archives, as long as you don't use it to reverse-engineer RAR compression. No warranty, blah blah blah, but you're free to included it in anything to handle RAR archives.

        • FTL:

          ALTERNATIVELY, provided that this notice is retained in full, this product may be distributed under the terms of the GNU General Public License (GPL), in which case the provisions of the GPL apply INSTEAD OF those given above.

          Like I said, it's a bsd-like license, or GPL. Your call.

  • No need that the scanner runs with LocalSystem rights, it could run standalone with no privileges and could be fed the files to scan by some RPC mechanism.

    • Yes, what really makes a system more secure is making it more complicated with more moving parts... try again.

I've noticed several design suggestions in your code.

Working...