Google Project Zero researcher Tavis Ormandy yesterday disclosed a series of 20-year-old flaws in Microsoft's CTF protocol that could allow unauthorized parties to take over applications that use said protocol.
According to Ormandy's blog post and technical analysis, the flaw is specifically found in the msctf subsystem, which is a component of the Text Services Framework that manages input methods, keyboard layouts, text processing and more.
In his analysis, Ormandy describes the CTF subsystem as a"vast and complex" environment, further noting in his blog post that the CTF protocol "allows applications to exchange input and read each other's content. However, there are a lot of protocol bugs that allow taking complete control of almost any other application."
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.