Welcome guest. Before posting on our computer help forum, you must register. Click here it's easy and free.

Author Topic: 'Nightmare' kernel bug lets attackers evade Windows UAC security  (Read 5416 times)

0 Members and 1 Guest are viewing this topic.

Allan

    Topic Starter
  • Moderator

  • Mastermind
  • Thanked: 1260
  • Experience: Guru
  • OS: Windows 10
'Nightmare' kernel bug lets attackers evade Windows UAC security
« on: November 28, 2010, 12:32:17 PM »
Microsoft is investigating reports of an unpatched vulnerability in the Windows kernel that could be used by attackers to sidestep an important operating system security measure.
 
 http://bit.ly/fuKbbh             

BC_Programmer


    Mastermind
  • Typing is no substitute for thinking.
  • Thanked: 1140
    • Yes
    • Yes
    • BC-Programming.com
  • Certifications: List
  • Computer: Specs
  • Experience: Beginner
  • OS: Windows 11
Re: 'Nightmare' kernel bug lets attackers evade Windows UAC security
« Reply #1 on: November 28, 2010, 12:43:27 PM »
Quote
Hackers cannot use the exploit to remotely compromise a PC, however, as it requires local access, a fact that Microsoft stressed. "Because this is a local elevation-of-privilege issue, it requires attackers to be already able to execute code on a targeted machine," said Bryant.

I think that's pretty important to consider, since the malicious code has to get to your machine first, and be executed.
I was trying to dereference Null Pointers before it was cool.

Allan

    Topic Starter
  • Moderator

  • Mastermind
  • Thanked: 1260
  • Experience: Guru
  • OS: Windows 10
Re: 'Nightmare' kernel bug lets attackers evade Windows UAC security
« Reply #2 on: November 28, 2010, 12:50:25 PM »
Agreed. Still.......

Veltas



    Intermediate

    Thanked: 7
    • Yes
  • Certifications: List
  • Computer: Specs
  • Experience: Beginner
  • OS: Linux variant
Re: 'Nightmare' kernel bug lets attackers evade Windows UAC security
« Reply #3 on: November 28, 2010, 01:00:28 PM »
Does this mean people can infect your kernel without you noticing?

Not like that's never happened before...

EDIT:

"On its own, this bug does not allow remote code execution, but does enable non-administrator accounts to execute code as if they were an administrator"

Hmmm, sounds worse now...

BC_Programmer


    Mastermind
  • Typing is no substitute for thinking.
  • Thanked: 1140
    • Yes
    • Yes
    • BC-Programming.com
  • Certifications: List
  • Computer: Specs
  • Experience: Beginner
  • OS: Windows 11
Re: 'Nightmare' kernel bug lets attackers evade Windows UAC security
« Reply #4 on: November 28, 2010, 02:16:20 PM »
Agreed. Still.......

Of course, it's still a vulnerability. But at least it's not the "OMG anybody can Blue screen my PC" type of thing with early versions of windows 95 or the various older "send a few magic packets to a PC and take it over via remote desktop" bugs in winXP and 2K.

Does this mean people can infect your kernel without you noticing?
No.
Quote
"On its own, this bug does not allow remote code execution, but does enable non-administrator accounts to execute code as if they were an administrator"

Hmmm, sounds worse now...

depends on the situation. I don't know about anybody else but I'm very careful about where I download executables from. A good percentage of people run with UAC disabled to begin with which I believe make this issue moot for them.
I was trying to dereference Null Pointers before it was cool.

Allan

    Topic Starter
  • Moderator

  • Mastermind
  • Thanked: 1260
  • Experience: Guru
  • OS: Windows 10
Re: 'Nightmare' kernel bug lets attackers evade Windows UAC security
« Reply #5 on: November 28, 2010, 02:24:11 PM »
A good percentage of people run with UAC disabled to begin with which I believe make this issue moot for them.
Yep. And that makes no sense at all - especially with the availability of "silent mode". Huge thread on UAC (been going on for years) at another support site.

Veltas



    Intermediate

    Thanked: 7
    • Yes
  • Certifications: List
  • Computer: Specs
  • Experience: Beginner
  • OS: Linux variant
Re: 'Nightmare' kernel bug lets attackers evade Windows UAC security
« Reply #6 on: November 28, 2010, 02:28:22 PM »
Sorry but stuff like this is always around, if you're that worried just download linux or something.

I'll agree with BC that just being careful about your sources is key to not getting this stuff.  Whenever I have security problems it's because I decided to download from a source I wouldn't usually trust but felt desperate enough to do so.. and suffered for it.

BC_Programmer


    Mastermind
  • Typing is no substitute for thinking.
  • Thanked: 1140
    • Yes
    • Yes
    • BC-Programming.com
  • Certifications: List
  • Computer: Specs
  • Experience: Beginner
  • OS: Windows 11
Re: 'Nightmare' kernel bug lets attackers evade Windows UAC security
« Reply #7 on: November 28, 2010, 02:54:55 PM »
Yep. And that makes no sense at all - especially with the availability of "silent mode".

You mean it makes no sense to run without UAC, not that UAC makes no sense, correct?


if you're that worried just download linux or something.
Linux is not any more secure then windows. This is a common fallacy. Both systems need to be properly configured to be secure.




I was trying to dereference Null Pointers before it was cool.

Allan

    Topic Starter
  • Moderator

  • Mastermind
  • Thanked: 1260
  • Experience: Guru
  • OS: Windows 10
Re: 'Nightmare' kernel bug lets attackers evade Windows UAC security
« Reply #8 on: November 28, 2010, 02:58:29 PM »
You mean it makes no sense to run without UAC, not that UAC makes no sense, correct?
Yes. There is no reason not to use it. If you find it too intrusive (as I do) then just run it in quiet mode / silent mode - which is what I do on all systems. And there's even a little utility (http://www.tweak-uac.com/home/) that makes switching modes a snap for anyone.