Author Topic: From Computer World article: Microsoft won't patch critical DLL loading bugs  (Read 1398 times)

0 Members and 1 Guest are viewing this topic.

Offline chief1983

  • Still lacks a custom title
  • Moderator
  • 212
  • ⬇️⬆️⬅️⬅️🅰➡️⬇️
    • Skype
    • Steam
    • Twitter
    • Fate of the Galaxy
From Computer World article: Microsoft won't patch critical DLL loading bugs
The link
 
Came across my *nix listserve oddly, and this one actually seemed worth pointing out here.  Particularly, the line "crucial Windows functionality has been misused by countless developers" caught my eye.   I hope we are not in that group.
Fate of the Galaxy - Now Hiring!  Apply within | Diaspora | SCP Home | Collada Importer for PCS2
Karajorma's 'How to report bugs' | Mantis
#freespace | #scp-swc | #diaspora | #SCP | #hard-light on EsperNet

"You may not sell or otherwise commercially exploit the source or things you created based on the source." -- Excerpt from FSO license, for reference

Nuclear1:  Jesus Christ zack you're a little too hamyurger for HLP right now...
iamzack:  i dont have hamynerge i just want ptatoc hips D:
redsniper:  Platonic hips?!
iamzack:  lays

 

Offline Iss Mneur

  • 210
  • TODO:
Re: From Computer World article: Microsoft won't patch critical DLL loading bugs
The link
 
Came across my *nix listserve oddly, and this one actually seemed worth pointing out here.  Particularly, the line "crucial Windows functionality has been misused by countless developers" caught my eye.   I hope we are not in that group.
We are vulnerable to the exploit (at least a far as I can tell) because while we only load dlls by name (OpenAL32, and the TrackIR dll).  We are still vulnerable becuase we normally suggest that FSO based games are placed in user writable locations because of the cache, log, and pilot files that get written to the game data directory.  Not that using a non-user writable location would likely help as, the entire premise of the exploit is social engineering anyway.  Nevertheless, this allows someone malicious to put trick a user into putting a malicious .dll into the game folder.

In reading the article, the only way that we can avoid this issue (as far as I can tell, becuase they don't really say what the issue is,) is to sign all of our executable code and the dlls that we load and to only allow content that has that signature. 

But our vulnerability actually goes further, because we will execute arbitrary lua code (with an unrestricted environment (ie. lua can write anywhere the user running FSO can)) we would have to sign our data files as well.  Which brings us back the the discussion that we had (started by portej05) many months ago about changing how the mod data is loaded to be by inclusion rather than by exclusion, which combined with data signing would make FSO much less vulnerable to exploit, especially for end users (as the devs would have to turn off the signature enforcement so that they could actually develop content).
"I love deadlines. I like the whooshing sound they make as they fly by." -Douglas Adams
wxLauncher 0.9.4 public beta (now with no config file editing for FRED) | wxLauncher 2.0 Request for Comments

  

Offline The E

  • He's Ebeneezer Goode
  • Moderator
  • 213
  • Nothing personal, just tech support.
    • Steam
    • Twitter
Re: From Computer World article: Microsoft won't patch critical DLL loading bugs
And we would still be vulnerable, because we can't sign every dll loaded by FSO. The GPU driver and OpenAL, not to mention the system libraries, are beyond our control.

As I understand it, this exploit can be activated by malware in the user's $PATH, and I'd have to agree with Iss that any attack that has that as a precondition is very much a social engineering problem.
If I'm just aching this can't go on
I came from chasing dreams to feel alone
There must be changes, miss to feel strong
I really need lifе to touch me
--Evergrey, Where August Mourns