Stories
Slash Boxes
Comments

SoylentNews is people

posted by janrinok on Friday June 03 2022, @05:35AM   Printer-friendly
from the it-is-it-isn't-it-is dept.

Code execution 0-day in Windows has been under active exploit for 7 weeks:

A critical code execution zero-day in all supported versions of Windows has been under active exploit for seven weeks, giving attackers a reliable means for installing malware without triggering Windows Defender and a roster of other endpoint protection products.

The Microsoft Support Diagnostic Tool vulnerability was reported to Microsoft on April 12 as a zero-day that was already being exploited in the wild, researchers from Shadow Chaser Group said on Twitter. A response dated April 21, however, informed the researchers that the Microsoft Security Response Center team didn't consider the reported behavior a security vulnerability because, supposedly, the MSDT diagnostic tool required a password before it would execute payloads.

On Monday, Microsoft reversed course, identifying the behavior with the vulnerability tracker CVE-2022-30190 and warning for the first time that the reported behavior constituted a critical vulnerability after all.

"A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word," the advisory stated. "An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user's rights."


Original Submission

This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
(1)
  • (Score: -1, Troll) by Anonymous Coward on Friday June 03 2022, @05:47AM

    by Anonymous Coward on Friday June 03 2022, @05:47AM (#1250128)

    n/t

  • (Score: 2, Interesting) by Opportunist on Friday June 03 2022, @08:20AM (8 children)

    by Opportunist (5545) on Friday June 03 2022, @08:20AM (#1250147)

    Taking a look at the exploit link we find something along the lines of

    ..\..\..\..\..\..\windows\system32\whatever...

    How on earth is something like this still possible?

    Ok, to answer my own question: Because in Windows, even today, every fucked up, insignificant process, even if it doesn't need any kind of privileges, runs as nt-authority\system and local system. Why the FUCK? You can't even argue with "oh, we have to stay compatible with legacy systems that expect it". It's your own fucking JOBS that run at this level!

    MS, seriously, your security is rubbish, it always has been and it always will be.

    • (Score: 2) by inertnet on Friday June 03 2022, @09:15AM

      by inertnet (4071) Subscriber Badge on Friday June 03 2022, @09:15AM (#1250161) Journal

      As I saw that "C:\Windows\System32" path, I was wondering if installing Windows in a different location would prevent such attacks. The attackers didn't even bother to use the %systemroot% or some such variable, presuming that it would be expanded in such scripts.

    • (Score: 0) by Anonymous Coward on Friday June 03 2022, @10:59AM (5 children)

      by Anonymous Coward on Friday June 03 2022, @10:59AM (#1250173)

      I'm not sure I get what you're saying (and I'm not excusing the flaw at all - it's a very bad one).
      Why are you picking up on the path? On a *NIX system, I can also do "../../../../../../../../../sbin/whatever" from my own ${HOME}. How _that_ particular thing something that ticks you off?
      *NIX has the setuid and setgid flags which Windows do not (they have other issues) so just accessing something on that \windows\system path doesn't mean it runs as you.

      Not trying to inflame, just trying to grok what you're trying to say.

      • (Score: 4, Insightful) by Opportunist on Friday June 03 2022, @11:37AM (4 children)

        by Opportunist (5545) on Friday June 03 2022, @11:37AM (#1250180)

        Yes, you can do that on Linux. The point is, though, that the average daemon can not. Daemons, at least if properly set up, run in their own environment and trying to "../../../../../etc/nc" out of it will fail.

        In a properly set up environment, it would also fail because the daemon is running with its own set of privileges and these exclude running any jobs that it doesn't have to run. Also something you can't really do if every fart you want to pass as a service runs on nt-authority/system rights.

        • (Score: 3, Insightful) by Thexalon on Friday June 03 2022, @12:06PM

          by Thexalon (636) Subscriber Badge on Friday June 03 2022, @12:06PM (#1250189)

          Also something you can't really do if every fart you want to pass as a service runs on nt-authority/system rights.

          But how else can Microsoft allow its business partners to spy on their customers? Geez, you people are so outdated with this idea that people should be able to control the boxes they allegedly own.

          --
          The only thing that stops a bad guy with a compiler is a good guy with a compiler.
        • (Score: 0) by Anonymous Coward on Friday June 03 2022, @03:14PM

          by Anonymous Coward on Friday June 03 2022, @03:14PM (#1250248)

          This has nothing to do with services. The RCE runs in user context.

        • (Score: 2) by RS3 on Friday June 03 2022, @04:40PM (1 child)

          by RS3 (6367) on Friday June 03 2022, @04:40PM (#1250276)

          Off the cuff, I'm wondering: if process x can't ask OS to run process y, but process x can read the file y, could process x do its own load and go of y? I know that's not privilege elevation, but maybe something to be gained? (I don't think like an attacker, and I'm always both amazed and of course troubled by their cleverness).

          • (Score: 2) by Opportunist on Friday June 03 2022, @05:47PM

            by Opportunist (5545) on Friday June 03 2022, @05:47PM (#1250301)

            It could, but y would run in the context of x. You don't really gain a lot that way.

    • (Score: 2) by istartedi on Saturday June 04 2022, @01:37AM

      by istartedi (123) on Saturday June 04 2022, @01:37AM (#1250411) Journal

      The "Are you kidding me" aspect for me has more to do with why a document would be allowed to invoke something called "Microsoft Support Diagnostic Tool". That seems like something that would only be run by the application when, oh... I dunno... when something goes wrong? Perhaps by the user when they want to troubleshoot something? Very rarely anyway, and certainly not at the whim of a document.

      --
      Appended to the end of comments you post. Max: 120 chars.
  • (Score: 0) by Anonymous Coward on Friday June 03 2022, @12:21PM

    by Anonymous Coward on Friday June 03 2022, @12:21PM (#1250195)

    i got this bad feelin that something is repeating itself on a global scale?
    prolly 'cause of a core dependancy and authority(*) over it : / (thats's the non-unicode "meeh" emoticon for you greenhorns).
    (*) you know something is wrong when this authority has to boot strap from twitter, facebook, instagram and the ilk.

  • (Score: 0) by Anonymous Coward on Friday June 03 2022, @02:40PM

    by Anonymous Coward on Friday June 03 2022, @02:40PM (#1250237)

    When the mainstream media lionized Bill Gate$ as an expert in biosecurity?

  • (Score: 4, Touché) by sigterm on Friday June 03 2022, @03:21PM

    by sigterm (849) on Friday June 03 2022, @03:21PM (#1250255)

    This only shows how important it is to use software that is actively supported by the vendor/developer(s).

    Oh, wait (#1):

    >A critical code execution zero-day in all
    >supported versions of Windows

    Well, bugs are a fact of life, and some will invariably affect system security.

    At least a responsible, commercial vendor with unimaginable amounts of money and resources will be able to respond to the discovery of a critical vulnerability by promptly releasing information on the issue, including any possible mitigation procedures, and of course develop and release a fix as fast as humanly possible.

    Oh, wait (#2):

    >has been under active exploit for seven
    >weeks, giving attackers a reliable means
    >for installing malware without triggering
    >Windows Defender and a roster of other
    >endpoint protection products.

    Well, I guess they should have a word with the incompetent vendor responsible for this "Windows Defender" application. Isn't this exactly what it's supposed to handle?

    Oh, wait (#3)...

  • (Score: 2, Interesting) by bobmorning on Friday June 03 2022, @05:36PM

    by bobmorning (6045) on Friday June 03 2022, @05:36PM (#1250297)

    Why organizations continue to use MS to run their critical infrastructure? Would you buy a car that you have to take back to the dealer every 2nd Tuesday of the month? Obviously, this memo didn't mean jack shit:

    https://news.microsoft.com/2012/01/11/memo-from-bill-gates/ [microsoft.com]

  • (Score: 0) by Anonymous Coward on Friday June 03 2022, @10:14PM

    by Anonymous Coward on Friday June 03 2022, @10:14PM (#1250361)

    This is just a test from Microsoft to see how they can give a better user experience.
    The OS is working as it always has, unperfectly.

    Soylent: you blocked my direct IP, Thanks! Now I really am Anonymous.

  • (Score: 2) by Rosco P. Coltrane on Saturday June 04 2022, @06:17AM (2 children)

    by Rosco P. Coltrane (4757) on Saturday June 04 2022, @06:17AM (#1250440)

    Isn't a 0-day exploit that's been exploited for 7 weeks a 49-day exploit?

    • (Score: 0) by Anonymous Coward on Saturday June 04 2022, @08:42PM

      by Anonymous Coward on Saturday June 04 2022, @08:42PM (#1250538)

      they used the windows calc.exe ...

    • (Score: 2) by Freeman on Monday June 06 2022, @02:15PM

      by Freeman (732) Subscriber Badge on Monday June 06 2022, @02:15PM (#1250963) Journal

      I guess. 0-day sounds more critical, though. Also, it's only cool, if it's 42, 69, 420, or 666.

      --
      Joshua 1:9 "Be strong and of a good courage; be not afraid, neither be thou dismayed: for the Lord thy God is with thee"
(1)