BLACK HAT: Vista ineffective against browser attacks

Share this article:

The memory protections in Windows Vista are largely ineffective at preventing browser exploitation. This was the position taken by two researchers presenting at the Black Hat conference in Las Vegas.

To prove the point, the researchers, Alexander Sotirov and Mark Dowd, showed an exploit that loaded from Internet Explorer despite all enabled memory protections built into the Vista operating system. 

In explaining the problem, the researchers said that most memory protection mechanisms are based on two things: detecting corruption and stopping common exploit patterns, and attempts to reinforce these are integral to Vista. But in many cases, some of the built-in protection mechanisms in Vista are not enabled by default for compatibility reasons.

“At the desktop level, compromises had to be made because of compatibility issues. Exploiters have a lot more control over browsers,” Sotirov said. 

And in many cases, third-party applications are not compiled to use the Vista memory protections. For example, Java and Flash are not compiled using the critical protection called ASLR.

According to the researchers, part of the reason for this situation is Microsoft's focus on Vista server processes, for which the protections are relatively effective.  

According to Sotirov, “This points up the need for more work on secure browser architecture.”

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

Email promises free pizza, ensnares victims in Asprox botnet instead

Email promises free pizza, ensnares victims in Asprox ...

Cloudmark came upon an email that offers free pizza, but clicking on the link to get the coupon ends with victims being ensnared in a botnet.

Report: most orgs lacking in response team, policies to address cyber incidents

In its Q3 threat intelligence report, Solutionary learned that 75 percent of organizations it assisted had no response team or policies and procedures to address cyber incidents.

Flash redirect campaign impacts Carnegie Mellon page, leads to Angler EK

Flash redirect campaign impacts Carnegie Mellon page, leads ...

Malwarebytes found that, since early July, thousands of sites had been targeted in the campaign.