WASHINGTON POST.COM


     SECURITY FIX


     Brian Krebs on Computer Security


     More Sony Problems to Be Revealed


Several groups of privacy and security experts are expected to release research later today that points to multiple, serious security flaws present in "*XCP*," the anti-piracy software used on an undisclosed number of *Sony BMG* music CDs. (For the record, *Security Fix* observed that experts were busily searching for such flaws <http://blogs.washingtonpost.com/securityfix/2005/11/hackers_raid_so_1.html> shortly after this whole fiasco began).

According to details provided by prominent security researcher *Dan Kaminsky <http://www.doxpara.com>*, the resulting public outcry could make Sony feel like the last two weeks of consumer backlash were a walk in the park.

Kaminsky will be unveiling research that indicates just how many computer networks have Sony's anti-piracy software installed on them. Kaminsky declined to be more specific, but numbers referenced <http://www.washingtonpost.com/wp-srv/technology/daily/graphics/complaint_111405.pdf> in a class-action lawsuit filed Tuesday in New York <http://blogs.washingtonpost.com/securityfix/2005/11/sony_faces_anot.html> against Sony and XCP maker *First4Internet* indicate that Sony sold approximately 3 million music CDs carrying the software.

"The net effect is that it's not in doubt that Sony has created a major security event on the Net," Kaminsky said in an online chat last night.

But wait, it gets ... er ... better. The researchers discovered a security flaw in XCP (which stands for "extended copyright protection") that could afford attackers a window through which to break into computers running the software and install additional software or viruses.

Kaminsky told me that one of the researchers involved in the investigation is *Edward Felten <http://www.cs.princeton.edu/%7Efelten/>*, a professor of computer science and public affairs at Princeton University.

And indeed, Felten's blog -- *Freedom to Tinker* <http://www.freedom-to-tinker.com/?p=926> -- hints as to the research he will release tomorrow along with *Alex Halderman <http://www.princeton.edu/%7Ejhalderm/>*, a Ph.D. student at Princeton whose research <http://www.cs.princeton.edu/%7Ejhalderm/cd3/> includes digital rights management technologies, including *SunnComm Technologies <http://www.sunncomm.com/index_flash.html>*, a different anti-piracy program used by other Sony titles <http://www.boingboing.net/2005/11/10/sony_music_cds_infec.html> :

"Alex Halderman and I have confirmed that Sony’s Web-based XCP uninstallation utility exposes users to serious security risk. Under at least some circumstances, running Sony’s Web-based uninstaller opens a huge security hole on your computer. We have a working demonstration exploit. ... In the meantime, we recommend strongly against downloading or running Sony’s Web-based XCP uninstaller."

(The name of Felten's blog is a nod to his prior <http://www.boingboing.net/2005/11/10/sony_music_cds_infec.html>high-profile legal dust-up with the entertainment industry <http://www.eff.org/IP/DMCA/Felten_v_RIAA/faq_felten.html> over alleged violations of the Digital Millennium Copyright Act <http://www.copyright.gov/legislation/dmca.pdf>.)

I tried to contact Felten earlier today, and no doubt he was too busy with this research to grab the phone. I contacted Halderman by e-mail, who confirmed that "the uninstaller can create even worse problems than" those created by the anti-piracy software itself. Halderman said further details would be available on Felten's site later today.

One of XCP's most alarming traits for security researchers has been its ability to hide not just its own files on a user's PC but also those of any other files, viruses or worms that follow the program's file-naming rules -- hidden so well that even antivirus programs can't find it.

Last week, about the same time that someone mass-spammed several versions of a virus <http://blogs.washingtonpost.com/securityfix/2005/11/virus_writers_e.html> designed to take advantage of XCP's file-hiding abilities, Sony issued a "patch" to help users remove the file-hiding function. (The patch did not uninstall the program itself, which resists removal so effectively that security researchers have equated it to a "rootkit <http://en.wikipedia.org/wiki/Rootkit>".)

But according to research to be presented tomorrow, that very same patch Sony issued to help close the security hole exposed by its software actually introduces additional security flaws.

While exposing oblivious users to additional risks when someone or something has already compromised their computer is in itself inexcusable, opening that user's system to backdoor security flaws and then paving the way for attackers to install whatever they please without fear of detection or removal is unconscionable.

Imagine the potential consequences of military personnel or government employees at work on a sensitive government network popping one of these CDs into their computer to listen to their favorite Sony-label music artist. If only half of this research turns out to be supported by the broader security community, Sony is about to find itself in big-league legal trouble.

_______________________________________________
Finale mailing list
[email protected]
http://lists.shsu.edu/mailman/listinfo/finale

Reply via email to