We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Sophos offers free tool to block Windows shortcut attack

Microsoft refuses to endorse the product

Article comments

Security firm Sophos released a tool on Monday that it claimed will block any attacks trying to exploit the critical unpatched vulnerability in Windows' shortcut files.

The tool, dubbed "Sophos Windows Shortcut Exploit Protection Tool," will protect users until Microsoft releases a permanent patch for the problem, said Chet Wisniewski, a senior security advisor at Sophos.

"The tool replaces Windows' icon handler, so that anything that calls the handler, we're going to intercept," Wisniewski told Computerworld.

But Microsoft refused to condone the Sophos tool, a position it takes whenever third-party solutions to a Windows bug are introduced.

"Microsoft does not endorse third-party tools," said Jerry Bryant, group manager with the Microsoft Security Response Center (MSRC). "We recommend that customers apply the workaround in Security Advisory 2286198, as it helps to protect customers from all known attack vectors."

The vulnerability is in how the Windows parses shortcuts, the small files that graphically represent links to programs and documents. Shortcuts are a key component of the Windows desktop, including the Start menu and the taskbar.

The bug was first described more than a month ago by VirusBlokAda, a little-known security firm based in Belarus. It attracted widespread attention only after security blogger Brian Krebs reported on it 15 July.

A day later, Microsoft confirmed the bug and admitted that attackers were already exploiting the flaw.

All versions of Windows contain the vulnerability, including the preview of Windows 7 Service Pack 1 (SP1), and the recently retired-from-support Windows XP SP2 and Windows 2000.

Exploit code has been widely distributed on the Internet, and Microsoft and others have spotted several attack campaigns based on the bug.

Initial attacks using the shortcut vulnerability were aimed at major manufacturing and utility companies. Two weeks ago, Siemens alerted customers of its Simatic WinCC management software that attacks using the vulnerability were targeting computers used to manage large-scale industrial control systems, often called SCADA, for "supervisory control and data acquisition."

Hackers gained control of computers at least one German customer of Siemens with the shortcut-exploiting "Stuxnet" worm, the electronics giant has confirmed.

Nearly 60% of the PCs identified by security vendor Symantec that have been infected by Stuxnet are located in Iran, a statistic that's sparked speculation that the country's infrastructure may have been targeted for attack.

Microsoft's advice has been to disable the displaying of shortcuts, a move many users may resist since it makes much of Windows almost unusable. The Sophos tool leaves shortcut icons untouched.

Wisniewski defended Sophos' release of the tool. "This is a reasonably unique situation in that we can put ourselves in the way of attacks," he said. "We're not suggesting that users not apply the Microsoft patch when it's ready. And the tool doesn't modify Windows or other files, so it's not really a patch."

The shortcut protection tool works by replacing Windows' own icon handler, then intercepting Windows' shortcut files -- identified by the ".lnk" extension -- and warning when it spots a suspicious shortcut.

"The tool looks at each shortcut to see whether it includes a code path with the vulnerable [LoadLibrary ()] call," said Wisniewski, talking about the specific Windows call that many researchers have pinpointed as the core problem. "Then it looks to see if that's calling an executable or .dll. If it is, the warning appears."

Microsoft has promised to patch the shortcut parsing bug, but has not yet disclosed a timeline. The next regularly-scheduled Windows security updates are to ship in two weeks, on Aug. 10.

"Microsoft needs to fix the core issue," echoed Wisniewski Monday. "That means they'll have to patch 'Shell32.dll' itself." Shell32.dll is a crucial Windows library file that contains numerous Windows Shell API (application programming interface) functions.

Microsoft must step carefully as it crafts a patch for the vulnerability, said Wisniewski, who added that that was the most likely reason why Microsoft had not issued a patch. "If they mess up [Shell32.dll], everyone's machine will really be messed up," said Wisniewski. "Their biggest challenge is testing the fix."

Microsoft's inability to endorse the shortcut tool notwithstanding, Sophos believes it's a credible defense until a patch is produced.

"Hopefully, Microsoft will [soon] release a proper patch to protect against the shortcut vulnerability, and then you can simply uninstall our tool," said Graham Cluley, a senior technology consultant at Sophos, in a post to his blog earlier Monday. "But in the meantime, this is neat. Very neat."

The Sophos Windows Shortcut Exploit Protection Tool works on Windows XP, Vista and Windows 7, but not on Windows 2000. It can be downloaded free-of-charge from the company's Web site.

Share:

Comments

Advertisement
Send to a friend

Email this article to a friend or colleague:


PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.


ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open
* *