News and Document archive source
copyrighted material disclaimer at bottom of page

NewsMinecabal-elitecorporatemicrosoft — Viewing Item


Bonk windows security hole

Original Source Link: (May no longer be active)
   http://www.wired.com/news/technology/0,1282,9581,00.html

http://www.wired.com/news/technology/0,1282,9581,00.html

Bonk! A New Windows Security Hole
Michael Stutz | Also by this reporter Page 1 of 1

10:30 AM Jan. 09, 1998 PT

Microsoft scrambled today to fix a newly reopened security hole that can crash any Windows 95 or NT machine connected to the Internet or any other TCP/IP network. The attack, named "bonk" - after the program that unleashes it - is a variant of an earlier security hole that creates a "denial of service" attack and essentially freezes the system.

"In terms of what we're doing, we're doing what we always do - which takes any security issue very, very seriously," said Microsoft's Jonathan Roberts, director of product management for Windows. "We're testing this program and working on a fix very actively," he said.

When completed, Redmond's fix will be posted to their Security Advisor Web site. Until it comes - and system administrators implement it - networked Windows 95 and Windows NT machines will remain vulnerable.

Bonk is a variant of an older security exploit known as "teardrop," which was reported by the Computer Emergency Response Team on 16 Dec of last year. The teardrop exploit worked on many different systems, and vendors had to release software patches to make their systems immune to the attack. Bonk appears to work specifically around a loophole in Microsoft's teardrop patch, and thus only affects Windows95 and Windows NT.

"The extent to which this affects other systems, we don't [yet] know," said Jonathan Roberts, director of product management for Windows.

"Without having the source code to Windows 95, it is hard to say exactly how their [networking subsystem] is handling this," said Kit Knox, a Senior System Administrator for CONNECTnet INS Inc., and co-maintainer of rootshell.com, a full-disclosure resource for security enthusiasts.

In essence, teardrop fools a machine into performing lots of operations that it shouldn't, Knox said. Bonk does the same: it sends corrupt UDP (User Datagram Protocol) packets to the target machine - overwhelming and crashing the system.

"It results in a blue screen of death which kills the Windows TCP/IP stack and leaves everything else alone," he said. "System data is not at risk."

Jiva DeVoe, a systems engineer with Devware Systems, di scovered the exploit after one of his Windows NT machines was attacked several days ago, in an attack spree that seemed to be targeted at DeVoe and other frequenters of an online Windows-related chat area.

DeVoe noticed that it looked very similar to a teardrop attack, even though his machine was running the Microsoft patch for that exploit. After examining the subtle variations, he was able to modify the source code for the old teardrop exploit to reproduce it, and then contacted Microsoft last night with his findings.

Until Microsoft releases a software patch, nothing can be done to stop a bonk attack, short of taking the machine off the network. "Unless you've got a firewall or something like that, there's not a whole heck of a lot that you can do," DeVoe said.

His solution: run Linux, a free variant of UNIX.

"I dual-boot my workstation between Linux and Windows NT," he said. "I'm a Microsoft Certified Systems Engineer, so kind of have to have NT there - even though I prefer Linux."

DeVoe said that openly-developed operating systems, such as FreeBSD and Linux, had patches available for the teardrop exploit very early on. "Those patches have stood up to this new attack as well," he said. "Microsoft's patch - a closed patch that nobody could review - was susceptible to this."

Meanwhile, the creators of bonk are trying to ensure that Microsoft does a more thorough job this (second) time around of patching the hole. A security bulletin on rootshell.com this morning released a modified, more resilient version of bonk, called "boink."



Aol joins microsoft alliance { May 30 2003 }
Arrest coming blaster attack { August 29 2003 }
Asian nations promote alternative to microsoft { April 3 2004 }
Beijing allegedly dumps windows 2000 for linux { January 7 2000 }
Bill gates meets tom ridge
Bill gates says dont fear outsourcing
Bonk windows security hole
College kid wants apology before dropping microsoft lawsuit
Eu hits microsoft with 613m fine
Eu regulators to discussion commision ruling against microsoft
Gates foundation invests in harmful oil companies { January 7 2007 }
Gates foundation invests in harmful sub prime lenders { January 8 2007 }
Goog email to compete with microsoft yahoo { April 2 2004 }
Hacker hits microsoft internet server { November 6 2000 }
Judge bash microsoft
Lawsuit for damaged against microsoft
Linux proves a winner down under { November 26 2003 }
Microsoft fixes force work on veterans day { November 11 2003 }
Microsoft lobbys pentagon { May 23 2002 }
Microsoft pays congress { October 15 1999 }
Microsoft pays social conservative ralph reed
Microsoft reaches 1 6b settlement with sun
Microsoft to pay shareholders up to 75b
Microsoft wants google { October 31 2003 }
Military microsoft contracts lax on nt security { May 6 1998 }
Security report blames microsoft for security { September 24 2003 }
Teekid blast author arrested
Walmart snubs microsoft with new laptop
Warnings against microsoft internet explorer security holes { July 12 2004 }
Windows nt hackers best friend { January 11 2001 }
Windows to require key for updates { July 26 2005 }
Worm snarles lockheed martin
Worm virus says gates fix software

Files Listed: 33



Correction/submissions

CIA FOIA Archive

National Security
Archives
Support one-state solution for Israel and Palestine Tea Party bumper stickers JFK for Dummies, The Assassination made simple