IWETHEY v. 0.3.0 | TODO
1,095 registered users | 0 active users | 0 LpH | Statistics
Login | Create New User
IWETHEY Banner

Welcome to IWETHEY!

New Microsoft vulnerable too - uses zlib code
[link|http://news.com.com/2100-1001-860328.html|MS Uses ZLib Code]

Members of the open-source compression project, Gzip, have posted a list of nearly 600 applications that a detection program has flagged as using the zlib code. Nine Microsoft applications are included in the list: Microsoft DirectX 8, FrontPage, the next-generation Graphics Device Interface, InstallShield, Internet Explorer, Office, NetShow, Visual Studio and Messenger.

The next-generation Graphics Device Interface is part of Windows XP, meaning that the operating system itself could be at risk.
Regards,

-scott anderson

"Welcome to Rivendell, Mr. Anderson..."
New Risk: adopting FS code without adopting FS practices
Microsoft has adopted and appropriate free software code. It's failed to adopt free software practices. The risk here is rather similar to the one pointed out (with a certain charming amount of repetition) by our very own LAME, ASD some years ago: the secretary's got the source code.

I was watching an NT 4.0 WS system here boot the other day, and something caught my eye. "Build 1381". That's the same build of the NT 4.0 kernel that I had on my desktop in 1997. Proprietary code has a strong tendency to rev very slowly, and a given build of a program may be extant in large numbers for years. Part of the security of free software comes in the quick cycle time -- people outrun the bugs. The other side of the security coin comes from the rich multitude of software versions out there. While it's (sometimes) a nightmare for compatibility, it also makes the cracker's job more difficult -- scripted attacks are likely to work against only a small number of vulnerable systems, just by virtue of the changing target syndrome.

I'll wager that a significant portion of Debian systems are already revved past this week's zlib flaw. I'll also wager that in three years, a significant portion of proprietary software systems based on zlib code will continue to exhibit the exploit, while the GNU/Linux and other free software systems have moved far beyond it.

Food for thought: you can't half adopt FS.
--
Karsten M. Self [link|mailto:kmself@ix.netcom.com|kmself@ix.netcom.com]
[link|http://kmself.ix.netcom.com/|[link|http://kmself.ix.netcom.com/|http://kmself.ix.netcom.com/]]
What part of "gestalt" don't you understand?
New But note that MS doesn't update the build #'s
I don't know the details, but I've noticed that updating the system via service packs doesn't change the build number; it's the same build number (1381) followed by the Service Pack #.

I'm not sure where other OS 'upgrades' (such as installing later versions of IE) are tracked.

Tony
     zlib advisory - (ben_tilly) - (16)
         Re: zlib advisory - a similar link. - (a6l6e6x)
         Remedy? - (kmself) - (3)
             Erg. - (static)
             Well OpenBSD was never vulnerable. :-) - (ben_tilly) - (1)
                 OpenBSD as server - (kmself)
         Re: zlib advisory - (pwhysall) - (1)
             Re: zlib and up2date - (a6l6e6x)
         Microsoft vulnerable too - uses zlib code - (admin) - (2)
             Risk: adopting FS code without adopting FS practices - (kmself) - (1)
                 But note that MS doesn't update the build #'s - (tonytib)
         I'm confused about the entire thing - (wharris2) - (5)
             DoS is an attack - (ben_tilly) - (4)
                 Re: DoS is an attack - (wharris2) - (3)
                     Then I suggest... - (Yendor) - (1)
                         I've run into double-free problems before - (wharris2)
                     It's a known class of exploit... - (kmself)

I have a horse!
63 ms