On Jul 5, 2006, at 11:37 PM, Eric Hattemer wrote:
Jim Thompson wrote:
I told him to not connect it to the Internet, because it would be
rooted in minutes.
http://www.realtechnews.com/posts/1511
Its ugly out there...
I haven't found a link to the original article or anything, but this
sounds largely absurd. A statement like this requires many
qualifications.
First, Windows ME by some definitions can't be rooted, since it
only has
one user.
You're going to argue semantics?
Second, any worms that might do any sort of automatic "rooting" almost
certainly do NOT apply to the dos-based versions of windows. From
sarc.com about blaster worm:
*Systems Affected
<http://securityresponse.symantec.com/avcenter/
refa.html#systemsaffected>:*
Windows 2000, Windows NT, Windows Server 2003, Windows XP
*Systems Not Affected
<http://securityresponse.symantec.com/avcenter/
refa.html#systemsnotaffected>:*
Linux, Macintosh, OS/2, UNIX, Windows 95, Windows 98, Windows Me
Right, so what about the WMF vulnerability? Granted, you have to
display an image (email attachment, web browser, etc), and this
requires "user involvement", but still, dude.. Microsoft has already
said that they wouldn't fix it.
http://securityresponse.symantec.com/avcenter/security/Content/
18322.html
Running 98 or ME? Just click here: http://www.dslreports.com/forum/
remark,15188688#15188722
Or the Music worm (including all variants)?
Or last year's "cursor/icon format" issues that allow remote code
execution:
http://www.microsoft.com/technet/security/bulletin/ms05-002.mspx
(again, email attachments or web browsers are the typical avenues of
restriction).
Or the HTML converter function issue present in *ALL* versions of
Windows:
http://support.microsoft.com/default.aspx?scid=kb;en-us;823559
Or the ZIP file buffer over-run: (Win98 (with "Plus Pack"), ME and XP)
http://support.microsoft.com/default.aspx?scid=kb;[LN];Q329048
Or this: http://support.microsoft.com/kb/q274548/
Or this: http://www.microsoft.com/technet/security/bulletin/
fq99-033.mspx
Or this: http://support.microsoft.com/kb/q238329/
Or this: http://support.microsoft.com/kb/q245729/
Or this: http://www.microsoft.com/technet/security/bulletin/
MS06-015.mspx
Or this: http://www.microsoft.com/technet/security/bulletin/
MS01-020.mspx
To say nothing of anything containing an "ActiveX" component, or what
loading the wrong Sony music CD might do to your machine.
This is true of most if not all non-self-inflicted and
non-browser-related worms. If you can find me a worm capable of
automatically infecting a windows ME machine without user input, I
will
be extremely surprised. The best I've ever found is one that will
propagate to shared drives on the network that have manually turned on
read/write sharing on the root of the hard drive regardless of whether
they set a password on the share. No sharing is enabled on windows ME
by default.
Or the five year old "UPNP" exploit. Granted, *Microsoft* didn't
ship with UPNP enabled in WinME, but some OEM
variants enable it (as well as the WinXP Internet Connection Sharing,
which is also vulnerable.) Once again, you can remotely exploit this
one (though no email/web browser is required...)
And though you can't run a remote exploit via this bug:
http://support.microsoft.com/kb/q275567/
Your 98/ME/NT4 computer won't stay on the net very long without the
patch. (There are many others like this.)
If you turn on sharing to the root of your hard drive with read/write
without ever going to windowsupdate.microsoft.com , then you do
deserve
what you get. Otherwise, a default install of windows ME is
relatively
safe.
Unless you read email or use the web browser.
Can you really recommend this stance to a *home user*?
Windows NT/2000/XP all were vulnerable to several classes of network
worms because they had retarded default security settings with open
ports for running services normal people would never need. All of
these
ports are firewalled by default in XP SP2, and almost all computers
that
have been built since August 2004 have SP2 built into the
installation/restoral CD. Until a worm comes out that hacks the
firewall itself (hasn't happened yet, but isn't impossible), all of
these XP SP2 machines are safe by default, and can only be hacked via
self-inflicted security holes (running randomly obtained exe files,
turning off the firewall, etc).
Unless, of course the OEM enables the ports. Or something like
"badpack3t" is modified to mount a remote exploit, rather than just
BSOD-ing XPSP2. badpack3t leverages the remote desktop assistant,
which is NOT firewalled in XP SP2's default firewall configuration.
And recommending "a hardware firewall" as a panacea is just... dumb.
Yep, I'll say "dumb". They have their place, but they won't protect
the casual home user against many (if not most) of the types of
attacks illustrated above.
And then there is the whole Finjan debacle. Care to open that can
of worms?
Jim