Russian company finds, patches hole in XP

A

anonymous

-------------------------------------------------------------------
This posting is provided "AS IS" with no warranties, and confers no
rights. You assume all risk for your use.
-------------------------------------------------------------------


Russian company finds, patches hole in XP
http://www.computerworld.com/securitytopics/security/holes/story/0,10801,99406,00.html?source=x10

Positive Technologies has released a patch for the flaw

News Story by Laura Rohde

JANUARY 31, 2005 (IDG NEWS SERVICE) - Russian security company
Positive Technologies has released a patch to a security hole it said
it discovered in Microsoft Corp.'s Windows XP Service Pack 2 last
year.

"We found two small flaws that a programmer could use to go around the
SP2 mechanism Data Execution Protection," Positive Technologies' chief
technology officer, Yury Maximov, said today.

As Microsoft explains on its Web site, DEP is a set of hardware and
software technologies that perform additional checks on memory to help
prevent malicious code from running on a system. According to Maximov,
Positive Technologies informed the software maker on Dec. 22 about a
problem with DEP and was told to wait for a response from the company.

"It has been over one month, and we have not heard from Microsoft, so
we decided to issue our own patch," Maximov said. "We understand that
Microsoft wants to protect its product, but we feel it is more
important for people to know about the problem and to know there is a
tool to protect them."

Maximov said that it was his understanding that hacker groups are
already working on ways to exploit the holes in DEP so as to insert
rogue code into a PC's memory.

Microsoft is still investigating the issue, but early analysis
indicates that the bypassing of DEP and the heap overflow protection
feature in Windows XP SP2 is not a security vulnerability, a Microsoft
spokeswoman said in a statement. "An attacker cannot use this method
by itself to attempt to run malicious code on a user's system," she
said.

Additionally, Microsoft is not aware of any attack exploiting the
vulnerability, the spokeswoman said. "Customers are not at risk from
the situation."

Still, Microsoft is looking at ways to prevent the bypassing of the
Windows XP SP2 protection features, either through an update as part
of its monthly security patch cycle or in a service pack, the
spokeswoman said.

Moscow-based Positive Technologies has developed a temporary security
measure, which it made available on Friday as a free utility called
PTmsHORP, Maximov said.

The security hole can't be fully eliminated by a separate patch,
according to Maximov, and Positive Technologies assumed that Microsoft
was not going to publish the problem or issue a security fix before
the release of Service Pack 3, he said.

But some analysts question the wisdom of downloading third-party
patches. "Personally, I would not advise people installing such
patches," said Ovum Ltd. analyst Graham Titterington. "There is a lot
of danger in installing patches from people or companies you're not
absolutely sure of. Chances are, there wouldn't be a problem, but that
is a risk not worth taking."

When other companies make publicly known the security problems within
Microsoft products such as SP2, it puts pressure on Microsoft to
address the issue, Titterington said, but publishing third-party
patches could possibly further the problem.

"I agree that not having heard from Microsoft for a month was slightly
undesirable, but the response time for situations like this are
usually more like three months," Titterington said.

The PTmsHORP utility can be found online at
www.maxpatrol.com/ptmshorp.asp.

Joris Evers, of the IDG News Service, contributed to this report.
 
M

Mikhail Zhilin

On Wed, 2 Feb 2005 17:56:57 +0100, anonymous

Russian company finds, patches hole in XP
<...>

Even if it is so, these several messages are typical spam --
and typical advertising campaign to sell

<quote from the advertiser's site>
THE ONLY SECURITY SCANNER
TODAY THAT CAN <etc.>
</quote>

So I would score them as exaggeration as minimum.
IMHO.
--
Mikhail Zhilin
Russia, Moscow
http://www.aha.ru/~mwz
Sorry, no technical support by e-mail.
Please reply to the newsgroups only.
======
 
J

jeffrey

This was also reported on www.techweb.com


Mikhail Zhilin said:
On Wed, 2 Feb 2005 17:56:57 +0100, anonymous


<...>

Even if it is so, these several messages are typical spam --
and typical advertising campaign to sell

<quote from the advertiser's site>
THE ONLY SECURITY SCANNER
TODAY THAT CAN <etc.>
</quote>

So I would score them as exaggeration as minimum.
IMHO.
--
Mikhail Zhilin
Russia, Moscow
http://www.aha.ru/~mwz
Sorry, no technical support by e-mail.
Please reply to the newsgroups only.
======
 
G

Guest

This is not a vulnerability or a security hole in XP/DEP. It just means that
there is a possibility that if an application is written a certain way and
contains a vulnerability that XP's software DEP wouldn’t be able to stop a
buffer overflow from occurring were that vulnerability to be attacked.

Fact is XP SP2 is still far less likely to be vulnerable to buffer overflow
attacks than it's predecessors because DEP can stop a lot of types of buffer
overflows from occurring.
 
M

Mikhail Zhilin

This was also reported on www.techweb.com

Moreover: there are many information found in the Internet -- all dated
January 31 and later. But nevertheless... I'm not a novice, and keep
track of information in this field -- and this company is not "on the
ears" even in Russia, from where this company is. But if to look to
their site -- it makes us think that it is the only company that knows
about Windows problems.

So for me it sounds as the wide promotion of nonessentials.

BTW, even simple Del /S command entered by user can create more problems
than the sum of the problems mentioned there -- and don't forget in this
context, that (1) you must have the programs, which use these flaws,
already at your computer: they can't sit there without either your
evident permission, or using the other much more critical flows if they
were not closed by using the critical patches; and (2) you have to
launch these programs -- with the same limitations.
--
Mikhail Zhilin
http://www.aha.ru/~mwz
Sorry, no technical support by e-mail.
Please reply to the newsgroups only.
======
 
M

Mikhail Zhilin

Great to see you here, Mikhail. :blush:)

Thank you, Kelly. :)

Though I would prefer to discuss the other questions -- not a spam. ;)
And sometimes do that here, in windowsxp.general group, as well.
--
Mikhail Zhilin
http://www.aha.ru/~mwz
Sorry, no technical support by e-mail.
Please reply to the newsgroups only.
======<..>
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top