Bug in Windows Kernel Could Prevent Security Software From Identifying Malware

Discussion in 'other security issues & news' started by itman, Sep 7, 2017.

  1. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,648
    Location:
    U.S.A.
    Another one that Microsoft won't patch.
    https://www.bleepingcomputer.com/ne...t-security-software-from-identifying-malware/
     
  2. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    They would have to patch to much, so it's easier not to do so. Then people wonder why I don't trust MS with my security
     
  3. Robin A.

    Robin A. Registered Member

    Joined:
    Feb 25, 2006
    Posts:
    2,587
    Maybe what you mean is that you don´t trust Windows with your security. The post doesn´t refer to MS security software.
     
  4. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    No Robin, what I said is exactly what I meant. Period. And yes it does refer to MS security software
     
  5. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,648
    Location:
    U.S.A.
    A few details about PsSetLoadImageNotifyRoutine:
    https://msdn.microsoft.com/en-us/library/windows/hardware/ff559957(v=vs.85).aspx

    Used in conjunction with PLOAD_IMAGE_NOTIFY_ROUTINE callback function:
    https://msdn.microsoft.com/en-us/library/windows/hardware/mt764088(v=vs.85).aspx

    It is fairly obvious that this bug if exploited would nullify HIPS and anti-exec capability to detect new process startup activities.

    Microsoft doesn't care since none of their "security" software mechanisms ever used or ever will use this capability. -EDIT- Or and more likely, Microsoft's "neglect" is just one more attempt to cripple third party security software to support their new profit making woefully deficit security software development.
     
    Last edited: Sep 7, 2017
  6. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,648
    Location:
    U.S.A.
    A comment from the original bleepingcomputer.com article:
    Your malware bypass is in the second paragraph.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.