[Am-info] Bill Gates' latest security thoughts miss the mark
Gene Gaines
gene.gaines@gainesgroup.com
Wed, 23 Jun 2004 21:01:24 -0400
Interesting take on Microsoft by the Network World guy
who writes their "Windows Networking Tips" column.
(Sorry, no mention of trees, bushes, or shrubs.)
Gene Gaines
gene.gaines@gainesgroup.com
Sterling, Virginia
- - - - - - - - - - - - - - - - - - - - - - - - - - -
NETWORK WORLD NEWSLETTER: DAVE KEARNS ON WINDOWS NETWORKING TIPS
06/23/04
Today's focus: Bill Gates' latest security thoughts miss the mark
...
By Dave Kearns
I get dozens of mailings from Microsoft every week, many of
which are pure marketing drivel and quickly go to my trash
folder. Occasionally, though, there are nuggets - such as the
hands-on security labs I mentioned last week - that can prove
useful. It happens rarely, though, and this week was no
exception. Still, there was one note that deserves a closer
look.
In the latest Microsoft Business Insights newsletter ("a monthly
newsletter highlighting the latest news and resources on using
Microsoft products, technologies, and partners to help solve
your line-of-business challenges," according to the blurb at the
Business Solutions Web site (
<http://www.microsoft.com/BusinessSolutions/> ) was the
headline: "What Bill Gates Is Doing to Protect You from
Hackers." Well. This I had to see.
The link took me to the "Microsoft Progress Report: Security,"
from Bill's Executive E-mail at the end of March (
<http://www.microsoft.com/mscorp/execmail/2004/03-31security.asp>
).
After a lot of verbiage about the rise of worms, viruses and
Trojans, Bill finally got around to telling me what he was doing
to help, much of which centered on Service Pack 2 for Windows
XP, due out any day now.
One vulnerability, which I've harped on about in this
newsletter, is the infamous "buffer overflow" (
<http://www.nwfusion.com/details/746.html> ). Here's what Bill
says will happen with XP SP2:
"Although no single technique can completely eliminate this type
of vulnerability, Microsoft is employing a number of security
technologies to mitigate these attacks. First, core Windows
components have been recompiled with the most recent version of
our compiler technology to protect against stack and heap
overruns. Microsoft is also working with microprocessor
companies, including Intel and AMD, to help Windows support
hardware-enforced data execute protection (also known as NX, or
no execute). NX uses the CPU to mark all memory locations in an
application as non-executable unless the location explicitly
contains executable code. This way, when an attacking worm or
virus inserts program code into a portion of memory marked for
data only, it cannot be run."
While that might seem commendable (and it probably does deserve
a cheer along the lines of "it's about time!"), the "NX"
technology doesn't prevent crackers from exploiting buffer
overflows; it only makes it more difficult. The cracker will
have to be sure that the exploit code overwrites existing
executable code. Crackers generally have lots of time to find
that information, and willingly share it among themselves.
What we really need are better programmers, Bill. We need
programmers who take the time to put in the bounds checking and
error handling that's necessary to catch buffer overflows before
they've had time to insert malicious code and without crashing
the machine, which would simply lead to more denial-of-service
attacks. It's not difficult, it doesn't require an advanced
degree in security services; it just requires dull grunt work on
the part of the application coders, designers and managers to
see that all avenues for exploits are cut off. Tell us how
you're going to do that, Bill.
...
Copyright Network World, Inc., 2004