Vista's DRM features could bedevil AV

A security researcher is raising concerns about a digital rights management feature in Microsoft's new Vista operating system that he claims may make it easy for malicious code authors to block virus programs from removing their wares.

In a presentation to antivirus researchers at the annual Virus Bulletin Conference in Montreal, Canada, Aleksander Czarnowski of the Polish firm AVET Information and Network Security, said that a new Vista feature, dubbed "protected processes," which provides digital rights management functionality in Vista, could be abused to protect rootkits and other malicious code.

A protected process is a new kind of construct that runs alongside other processes, or instances of programs running simultaneously in multitasking operating systems such as Windows. Standard processes are subject to manipulation by other "parent" processes, or processes that privileged or administrative users create, making them subject to tampering by those interested in digital content piracy. Restrictions put into Windows Vista require new protected processes to be signed, and restrict interaction between standard and protected processes and threads (tasks) created by protected processes. For example, standard processes can't inject a thread into a protected process or access the virtual memory used by a protected process, according to Microsoft.

Those limitations are great for controlling the distribution of and access to valuable media content, because they allow content owners to run media in a protected state within Vista that limits the ways the media can be used to those condoned by the content (or copyright) owner. However, protected processes could bedevil virus software vendors that want to analyse changes made by malicious software, Czarnowski warned.

"Protected processes are insulated from other applications, even with administrative privileges," he said.

For example, Czarnowski hypothesized that malicious software that was able to take control of protected processes could use them to modify memory addresses and make other changes that would be invisible to virus software and other detection tools running in the same environment.

Protected processes create an underlying architecture for PMP (Protected Media Path), a secure platform for displaying working with "premium" media content on Vista and Longhorn, and preventing piracy.

PMP, which includes modules such as PE (Protected Environment) and PUMA (Protected User Mode Audio) includes user-mode and kernel-mode protection to prevent what Microsoft calls "rogue software components" from stealing content.

"I don't think anyone in this DRM race thought about the consequences of putting this ability in the wrong hands," Czarnowski said. "Protected Processes are a weapon and, as with every weapon, everything depends on how you use it."

Microsoft wasn't immediately able to offer comment for this article, but the company seemed to be aware that protected processes could be subject to abuse.

A company document on "best practices" with protected processes warns developers not to "attempt to circumvent this restriction by installing a kernel-mode component to access the memory of a protected process," because Vista and third-party products rely on the fact that "protected processes are signed code that is run in a contained environment."

Czarnowski said he doesn't know of any efforts to manipulate protected processes. His comments came at the tail end of a technical presentation on rootkit techniques at the Virus Bulletin show.

Among other things, Czarnowski predicted that Vista's kernel protection technology, PatchGuard, would become a major target of the malicious coding community and that techniques for evading kernel protections might be publicly available within a year of Vista's release -- and perhaps sooner.

Senior technical consultant at Kaspersky Labs, Shane Coursen, said both the driver-signing protections and kernel protection have been proven to be vulnerable to manipulation.

The efficacy of hacks such as " Blue Pill ," an effort to circumvent Vista kernel protections that was developed and demonstrated by Singapore's Computer Security Initiative Consultancy (COSEINC)'s Joanna Rutkowska, are still being debated. It's only a matter of time before other malicious code authors build on the work of researchers like Rutowska, Coursen said.

"Based on past experience, it usually takes a little more than a year for these advanced technologies to come out and be used by the bad guys. Unfortunately, we have some things in the works already and that could move up the timeline," Coursen said.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Paul F. Roberts

InfoWorld
Show Comments

Cool Tech

Toys for Boys

Family Friendly

Stocking Stuffer

SmartLens - Clip on Phone Camera Lens Set of 3

Learn more >

Christmas Gift Guide

Click for more ›

Brand Post

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Aysha Strobbe

Microsoft Office 365/HP Spectre x360

Microsoft Office continues to make a student’s life that little bit easier by offering reliable, easy to use, time-saving functionality, while continuing to develop new features that further enhance what is already a formidable collection of applications

Michael Hargreaves

Microsoft Office 365/Dell XPS 15 2-in-1

I’d recommend a Dell XPS 15 2-in-1 and the new Windows 10 to anyone who needs to get serious work done (before you kick back on your couch with your favourite Netflix show.)

Maryellen Rose George

Brother PT-P750W

It’s useful for office tasks as well as pragmatic labelling of equipment and storage – just don’t get too excited and label everything in sight!

Cathy Giles

Brother MFC-L8900CDW

The Brother MFC-L8900CDW is an absolute stand out. I struggle to fault it.

Luke Hill

MSI GT75 TITAN

I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Emily Tyson

MSI GE63 Raider

If you’re looking to invest in your next work horse laptop for work or home use, you can’t go wrong with the MSI GE63.

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?