Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 18 submissions in the queue.
posted by n1 on Tuesday January 26 2016, @06:56AM   Printer-friendly
from the fried-or-baked-debate dept.

Security researchers from Foxglove Security have discovered that almost all recent versions of Microsoft's Windows operating system are vulnerable to a privilege escalation exploit. By chaining together a series of known Windows security flaws, researchers from Foxglove Security have discovered a way to break into PCs/systems/laptops running on Windows 7/8/8.1/10 and Windows Server 2008/2010 [2012].

[...] Hot Potato relies on three different types of attacks, some of which were discovered back at the start of the new millennium, in 2000. By chaining these together, hackers can remotely gain complete access to the PCs/laptops running on above versions of Windows.

Surprisingly, some of the exploits were found way back in 2000 but have still not been patched by Microsoft, with the explanation that by patching them, the company would effectively break compatibility between the different versions of their operating system.

Source: http://www.digitalmunition.me/2016/01/ya9jvvyujexmyccqfjrcj/


Original Submission

This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 5, Funny) by Marand on Tuesday January 26 2016, @07:33AM

    by Marand (1081) on Tuesday January 26 2016, @07:33AM (#294825) Journal

    Surprisingly, some of the exploits were found way back in 2000 but have still not been patched by Microsoft, with the explanation that by patching them, the company would effectively break compatibility between the different versions of their operating system.

    Well, with the aggressive push to make everyone use Windows 10, that should no longer be a concern, right? So it will probably get fixed soon, and if doing so happens to break things for the older versions that are still supported, too bad, you should have upgraded before they kneecapped you.

    • (Score: 0) by Anonymous Coward on Tuesday January 26 2016, @08:21AM

      by Anonymous Coward on Tuesday January 26 2016, @08:21AM (#294839)

      I do recall someone's inside source stating "mistakes will be made". Back-fire potential much?

  • (Score: 2) by Gravis on Tuesday January 26 2016, @07:39AM

    by Gravis (4596) on Tuesday January 26 2016, @07:39AM (#294827)

    Who wants to be able to recompile programs anyway? ;)

  • (Score: 1, Offtopic) by aristarchus on Tuesday January 26 2016, @07:54AM

    by aristarchus (2645) on Tuesday January 26 2016, @07:54AM (#294832) Journal

    "Shocked, I say, to discover that there is gambling taking place in this establishment!"

    "Play it again, Bill"

    A kiss is just a kiss, but the fundamental things apply, as time goes by.

    Casablanca, originally they tried to cast Bill Gates as Rick, after Ronald Reagan fell for a monkey.

    We'll always have Paris!

    • (Score: 2, Funny) by Anonymous Coward on Tuesday January 26 2016, @11:40AM

      by Anonymous Coward on Tuesday January 26 2016, @11:40AM (#294859)

      SysAdmins, can we have a "-1 Gibberish" mod category now?

      • (Score: 2) by aristarchus on Tuesday January 26 2016, @04:28PM

        by aristarchus (2645) on Tuesday January 26 2016, @04:28PM (#294946) Journal

        A bit too much of a literary/cinema reference for you, then? Casablanca, Free French in exile from the Vichy regime under the power of the Nazis? Some things never change. Vulnerabilities in Micro$oft? Never saw it coming.

        Just because you do not understand a comment does not mean it is gibberish. There is another possibility. And a whole new world.

        • (Score: 2) by fido_dogstoyevsky on Wednesday January 27 2016, @12:46AM

          by fido_dogstoyevsky (131) <{axehandle} {at} {gmail.com}> on Wednesday January 27 2016, @12:46AM (#295087)

          Some things never change. Vulnerabilities in Micro$oft? Never saw it coming.

          Should have rounded up the usual suspects.

          --
          It's NOT a conspiracy... it's a plot.
          • (Score: 2) by aristarchus on Wednesday January 27 2016, @01:01AM

            by aristarchus (2645) on Wednesday January 27 2016, @01:01AM (#295092) Journal

            This could be the start of a beautiful friendship.

            • (Score: 2) by fido_dogstoyevsky on Wednesday January 27 2016, @02:51AM

              by fido_dogstoyevsky (131) <{axehandle} {at} {gmail.com}> on Wednesday January 27 2016, @02:51AM (#295125)

              This could be the start of a beautiful friendship.

              So we'll always have Paris.

                

              We are talking about that Peter Falk movie?

              --
              It's NOT a conspiracy... it's a plot.
              • (Score: 2) by aristarchus on Wednesday January 27 2016, @04:52AM

                by aristarchus (2645) on Wednesday January 27 2016, @04:52AM (#295153) Journal

                We are talking about that Peter Falk movie?

                No! Of course not! That would be offtopic! We are talking about massive and long-running security holes in the proprietary operating system world! Although, now that you mention it, "Jeepers, Creepers, where'd ya get those Peepers" does seem to be an entirely appropriate musical number for Windoxe 10, much better than "As Time Goes By"

                "The Cheap Detective" was a parody of a whole bunch of film noir detective movies, mostly starring the immortal Bogart. Wikipedia says: "The film spoofs Casablanca, The Maltese Falcon, Chinatown, and To Have and Have Not. The scene in the restaurant with Peckinpaugh and Pepe Damascus mocks the opening scene of The Big Sleep." So Falk was good, but only good because he was mimicking the greater. Kind of like how NT was "based" on, oh, I forget. Something without so many security holes.

  • (Score: 1, Funny) by Anonymous Coward on Tuesday January 26 2016, @11:06AM

    by Anonymous Coward on Tuesday January 26 2016, @11:06AM (#294853)

    You probably meant Windows 2012...

  • (Score: 3, Interesting) by Nerdfest on Tuesday January 26 2016, @11:14AM

    by Nerdfest (80) on Tuesday January 26 2016, @11:14AM (#294855)

    Nice to see the exploit being given a nice marketable name as they've rumoured to have been doing for Linux exploits. I'm overly paranoid, but this does make me wonder if this is just another attempt to drive people to Windows 10, with them "breaking compatibility" with the fix only in older versions.

    • (Score: 3, Interesting) by LoRdTAW on Tuesday January 26 2016, @01:20PM

      by LoRdTAW (3755) on Tuesday January 26 2016, @01:20PM (#294883) Journal

      Seriously. But I highly doubt it since 7 is still in LTS and many corporate users aren't yet migrating.

      • (Score: 2) by Nerdfest on Tuesday January 26 2016, @01:49PM

        by Nerdfest (80) on Tuesday January 26 2016, @01:49PM (#294886)

        You're probably correct. It's most likely just some well deserved karma.

  • (Score: 1, Funny) by Anonymous Coward on Tuesday January 26 2016, @12:23PM

    by Anonymous Coward on Tuesday January 26 2016, @12:23PM (#294871)

    If compatibility means you should be able to hack all the systems the same way...
    of course, they should never fix it.

  • (Score: 3, Interesting) by frrubi on Tuesday January 26 2016, @02:38PM

    by frrubi (5953) on Tuesday January 26 2016, @02:38PM (#294910)

    I'm horrible with technology, however, with the rise of microshaft winblows disseminating everything you do, in, on, and around their OS. Even I knew that it was time to switch to Linux, it's been a long and disparaging road, no doubt. I'm finally getting the hang of things, to be cliche; if a dummy shit kicker army guy like myself can make the switch, anyone can do it!

  • (Score: 2) by meisterister on Tuesday January 26 2016, @06:44PM

    by meisterister (949) on Tuesday January 26 2016, @06:44PM (#294968) Journal

    Those of us running Windows Vista are excluded! Ha! Now I'll just be busy waiting 10 minutes to copy five files aaaaand...

    --
    (May or may not have been) Posted from my K6-2, Athlon XP, or Pentium I/II/III.
    • (Score: 2) by Immerman on Wednesday January 27 2016, @07:37PM

      by Immerman (3985) on Wednesday January 27 2016, @07:37PM (#295503)

      Nope, they just didn't feel it was worth mentioning you three.

  • (Score: 4, Informative) by NotSanguine on Wednesday January 27 2016, @01:08AM

    by NotSanguine (285) <{NotSanguine} {at} {SoylentNews.Org}> on Wednesday January 27 2016, @01:08AM (#295097) Homepage Journal

    And read the TFA and the referenced "security researchers" blog posting.

    Once again, it's odd that no reference to or report creating a CVE entry was forthcoming.

    IIUC, the exploit chains three vulnerabilities (each of which requires that the local system is pretty much unsecured in out-of-the-box fashion), and must first gain local access (physical access or inducing the victim to download/install software).

    Once that's accomplished, the exploit requires NBNS (NetBios Name service, deprecated for quite some time -- in fact, any corporate environment should have disabled this at least a decade ago) and a deprecated (v1) version of NTLM (again, this should have been disabled ages ago).

    Once the exploit has successfully been performed, arbitrary code can indeed be run as a *local* administrator on the victim system.

    While this is (IMHO) an interesting extension of work done by Google Project Zero [google.com] a couple of years ago, there's nothing really new except the authors' desire for publicity.

    --
    No, no, you're not thinking; you're just being logical. --Niels Bohr