Feeds

Microsoft tells US Air Force to bug off

Outlook patch is patchy

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

Microsoft's security patch for Outlook, which is designed to protect users from the effects of another Love Bug-style virus, has come under fire from no less a body than the US Air Force.

In a paper to be presented at a security workshop in June, an assistant professor of computer science at the US Air Force Academy will deliver a devastating critique of Microsoft's approach to security in general and Outlook in particular.

Martin Carlisle will tell an audience of security experts that a security patch to Outlook, which is designed to stop viruses spreading via automated messages through requiring user's authorisation via a dialog box, can be easily circumvented.

This "Object Model Guard" prompts a user with a dialogue box when an external program tries to access a user's Outlook address book, a trick used by the Love Bug and other similar viruses.

Carlisle said this idea has promise but Microsoft's implementation is flawed.

"It is possible, with a small amount of code, to create a program that hides and answers the dialog box automatically," said Carlisle.

In a paper to be presented at the workshop Carlisle explains how Microsoft dismissed the significance of the potential vulnerability. Its security team argues that to get around the dialog box they would have to get executable code running on a victims machine, and if an attacker could do that getting around the dialog box would be "the least of your worries".

This, frankly astonishingly arrogant response, is given short shrift by Carlisle: "The Microsoft Security Team seem to have missed the significance of their own security patch because their view neglects the ability of viruses of this class to replicate."

Carlisle and colleague (and co-author) Scott Studer have produced a detailed rebuttal of Microsoft's argument and suggestions of improvement to the dialogue box security, which involve protecting the lowest level of an application.

In a statement we find hard to disagree with the researchers state that reinforcing dialogs based security in Windows can only go so far.

"Given the current limitations of the Windows operating system, this [improving dialogue box security] turns to be similar to trying to secure a parked car at an airport. You can make it harder to break in but you can never make you car totally secure."

The researchers said that Microsoft should consider modifying its operating system in order to verify that messages received come from users rather than other programs. Carlisle and Studer also cover a variety of other ideas for dealing with Love Bug-style viruses (such as blocking Visual Basic Scripting) and their paper is well worth a read. ®

External links

USAF paper: Reinforcing Dialog-Based Security

Related Stories

Reports of death of email viruses greatly exaggerated?
No more I Love You viruses
Rise in viruses within emails outpacing growth of email
Users haven't learned any lessons from the Love Bug

Internet Security Threat Report 2014

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
How to simplify SSL certificate management
Simple steps to take control of SSL certificates across the enterprise, and recommendations centralizing certificate management throughout their lifecycle.