Feeds

Vista security overhaul questioned

User Account Control: insecure by design?

Choosing a cloud hosting partner with confidence

Security researchers have taken issue with Microsoft's implementation of a security feature in Vista that is designed to stop users from routinely running systems in admin mode.

Users of Windows XP and older Microsoft operating systems habitually ran PCs in admin mode, which gives unrestricted access to the system. As a result, malware attacks carried the ability to take over compromised systems which wouldn't normally be possible if a machine was running in user mode.

The User Account Control (UAC) security functionality of Windows Vista is designed to address this problem by obliging users to run their Vista PCs via a normal user account by default. Users are asked to switch modes and enter login credentials when they request a task requiring admin credentials.

White hat hacker Joanna Rutkowska discovered that users attempting to run an installation file need to do so in admin mode. That means users are confronted with the all-or-nothing choice of granting an installed program complete system privileges or abandoning an installation altogether.

"That means that if you downloaded some freeware Tetris game, you will have to run its installer as administrator, giving it not only full access to all your file system and registry," Rutkowska writes, adding that Win XP gave her the ability to add permissions to her normal (restricted) user account that isn't possible with Vista.

Mark Russinovich, a technical fellow at Microsoft, argues in a detailed response that the design of Vista's User Account Control balances security and usability.

Rutkowska acknowledges that Microsoft has improved the security of its operating system with Vista but warns that the security shortcomings of UAC can not be so easily dismissed. "UAC is not perfect [but that] doesn't diminish the fact that it's a step in the right direction, implementing a least-privilege policy in Windows OS," she writes.

Rutkowska takes issue with Microsoft's contention that flaws in UAC controls don't in themselves create security bugs. She points, by way of example, to a security bug she has discovered which allows a low integrity level process to send WM_KEYDOWN messages to a command prompt window running at high integrity level as among the types of problems she is seeking to highlight. ®

Beginner's guide to SSL certificates

More from The Register

next story
NASTY SSL 3.0 vuln to be revealed soon – sources (Update: It's POODLE)
So nasty no one's even whispering until patch is out
Russian hackers exploit 'Sandworm' bug 'to spy on NATO, EU PCs'
Fix imminent from Microsoft for Vista, Server 2008, other stuff
US government fines Intel's Wind River over crypto exports
New emphasis on encryption as a weapon?
To Russia With Love: Snowden's pole-dancer girlfriend is living with him in Moscow
While the NSA is tapping your PC, he's tapping ... nevermind
Forget passwords, let's use SELFIES, says Obama's cyber tsar
Michael Daniel wants to kill passwords dead
Slap for SnapChat web app in SNAP mishap: '200,000' snaps sapped
This is what happens if you hand your username and password to a 3rd-party
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Win a year’s supply of chocolate
There is no techie angle to this competition so we're not going to pretend there is, but everyone loves chocolate so who cares.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.