Researcher told Microsoft of Windows apps zero-day bugs 6 months ago

UC Davis researcher names 28 vulnerable apps, claims four remote code vulnerabilities

Microsoft has known since at least February that dozens of Windows applications, including many of its own, harbor bugs that hackers can exploit to seize control of computers, an academic researcher said Sunday.

At least four of the bugs can be exploited remotely, Taeho Kwon, a Ph.D. candidate at the University of California Davis, said in a paper he published in February and presented last month at an international conference.

Kwon added his voice to a growing chorus of researchers who claim that a large number of Windows programs are vulnerable to attack because of the way they load components.

Last week, U.S. researcher HD Moore said he had found at least 40 vulnerable applications , including the Windows shell. The next day, Slovenian security firm Acros announced its homegrown tool had uncovered more than 200 flawed Windows programs in an investigation that began four months ago.

According to Moore, Acros and now Kwon, many Windows programs can be exploited by hackers who trick users into visiting malicious Web sites because of the way the software loads code libraries -- dubbed "dynamic-link library" in Windows, which marks them with the ".dll" extension. If hackers can plant malware disguised as a .dll in one of the directories an application searches when it looks for the library, they can hijack the PC.

On Saturday, Kwon claimed his work preceded Moore's and Acros'.

In the paper he presented last month at the International Symposium on Software Testing and Analysis (ISSTA), Kwon said that he had submitted a bug report to the Microsoft Security Response Center (MSRC).

"[MSRC] is working with us to develop necessary patches," said Kwon in the paper, which also carried the name of his advisor, Zhendong Su, an associate professor in the school's computer science department.

Kwon's paper detailed the systemic problem in Windows applications' loading of .dlls, listed 28 programs that collectively contained over 1,700 separate bugs, and spelled out how hackers could exploit those vulnerabilities.

He also developed a tool to detect unsafe .dll loads, then ran it on several popular programs. But unlike Acros, which used its own tool to do the same, Kwon named the software that failed the test.

According to Kwon, all the major applications in Microsoft's Office 2007 suite are vulnerable, as are Internet Explorer 8 (IE8), Firefox, Chrome, Opera and Safari browsers; PDF viewers including Adobe Reader and Foxit; instant messaging clients such as Windows Live Messenger, Skype and Yahoo Messenger; and multimedia players like QuickTime, Windows Media Player and Winamp.

In many cases, the applications he tested have been superseded by newer versions that may have been patched in the interim. For example, Kwon tested Mozilla's Firefox 3.0, which has been retired in favor of Firefox 3.5 and Firefox 3.6.

Kwon did not immediately respond to a second round of questions Sunday, including when he tested the applications for the .dll loading vulnerability.

But the UC Davis researcher, who classified the vulnerabilities as "resolution failure" and "resolution hijacking" bugs, noted that the flaws are not new.

"The problem of unsafe dynamic loading had been known for a while, but it had not been considered a serious threat because its exploitation requires local file system access on the victim host," Kwon wrote. "[But] the problem has started to receive more attention due to recently discovered remote code execution attacks."

The issue appears to have been first reported a decade ago by researcher Georgi Guninski. Yet Microsoft didn't take a stab at patching it until last year.

In April 2009, Microsoft issued MS09-015 , a Windows update designed to boost the operating system's defense against such attacks. But even that fix was long in coming, complained Israeli security researcher Aviv Raff.

"Microsoft declined fixing the bug in Windows until I found a way to automatically exploit Internet Explorer via Safari," Raff said Saturday in an instant message. "They said it would be very problematic to fix the whole thing, and would break a lot of third-party Windows applications. But eventually they fixed IE and updated the OS as well by changing the .dll loading patch search order."

Raff had originally reported the IE bugs in late 2006, and repeated his warnings in 2008 after another researcher revealed a flaw in Apple's Safari browser that could be used to "carpet bomb" Windows machines with malicious desktop shortcuts.

Kwon did not speculate on how Microsoft might try to patch the problem. But others have said they believe it will be difficult or even impossible to fix Windows without crippling a large number of applications. Still, something has to be done, Kwon argued.

"Our results show that unsafe DLL loadings are prevalent, and some can lead to serious security threats," Kwon stated. "More specifically, we found more than 1,700 unsafe dynamic component loadings with the administrative privilege and 19 remotely exploitable unsafe component loadings that can easily cause remote code execution."

So far, Microsoft has only acknowledged that it is investigating Moore's reports, but has not said whether, and if so, when it might release a patch. It might need to do so quickly; Moore promised that on Monday he would release a toolkit that "audits the local system and generates PoCs," or proof-of-concept attack code.

Kwon's paper, titled "Automatic Detection of Vulnerable Dynamic Component Loadings," can be obtained from the UC Davis Web site ( download PDF ).

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection

Tags securityMicrosoftoperating systemssoftwareWindows

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Gregg Keizer

Computerworld (US)
Show Comments





Back To Business Guide

Click for more ›

Most Popular Reviews

Latest Articles


PCW Evaluation Team

Louise Coady

Brother MFC-L9570CDW Multifunction Printer

The printer was convenient, produced clear and vibrant images and was very easy to use

Edwina Hargreaves

WD My Cloud Home

I would recommend this device for families and small businesses who want one safe place to store all their important digital content and a way to easily share it with friends, family, business partners, or customers.

Walid Mikhael

Brother QL-820NWB Professional Label Printer

It’s easy to set up, it’s compact and quiet when printing and to top if off, the print quality is excellent. This is hands down the best printer I’ve used for printing labels.

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?