[ISN] 6 Month Vista Vuln Report, Debunked (fwd)

From: InfoSec News (alerts@private)
Date: Tue Jun 26 2007 - 23:12:33 PDT


Forwarded from: security curmudgeon <jericho (at) attrition.org>

---------- Forwarded message ----------
From: Kristian Hermansen <kristian.hermansen (at) gmail.com>
To: full-disclosure (at) lists.grok.org.uk, dailydave (at) lists.immunitysec.com
Date: Tue, 26 Jun 2007 09:09:31 -0400
Subject: [Full-disclosure] 6 Month Vista Vuln Report, Debunked

This report from Microsoft's  Jeff R. Jones is ludicrous:

http://www.csoonline.com/pdf/6_Month_Vista_Vuln_Report.pdf

The Microsoft "researcher" claims that Windows Vista is exponentially 
less vulnerable than many Linux distributions and Mac OS X.  It may be 
true that the default Vista installation has had less public 
vulnerability reports, and that Linux has had many more, but this is due 
to the nature of Open Source.  Jeff does not include any "silently 
fixed" vulnerabilities that have been patched since Vista was released 
and Microsoft has not disclosed such vulnerabilities publicly.

Here is a per section debunking of his paper broken down by topic, 
because I feel Jeff really needs to perform another less exaggerated 
analysis.

"Window Vista - The First 6 Months"

Let's remember that Vista was released to business partners earlier than 
home users.  He does not account for this gap, and thus, this could 
soften the exposure of the official Vista code to many researchers for 
analysis.

"Teredo"

Teredo is also a major hole, and they are leaving it wide open.  The 
community feels this is a flaw, but Microsoft doesn't seem to care. 
Also, the entire networking stack was rewritten for Vista, and that 
means lots of new bugs are present.  I have already spoken to other 
researchers who have not disclosed such flaws publicly.  However, a good 
start for learning about some is the Symantec paper that analyzed Vista 
during the BETA phases and revealed numerous issues.

"Windows XP"

Windows XP, touted as the most secure OS to date on release.  Also, 
touted as secure in SP1, and again most secure in SP2.  We are now 
seeing it again with Vista.  Are we really supposed to believe that 
somehow this mantra is going to change just because Microsoft tells us 
so?  In defense of Microsoft, however, they have focused their efforts 
to really clean things up, and that is commendable.

"Red Hat Enterprise Linux 4 Workstation"

OK.  The claims here are just plain insulting.  The 100+ vulnerabilities 
include such software as PostgreSQL, MySQL, mailman, squid, and emacs.  
None of this software is installed in a default installation of RHEL4.  
I think the guy clicked on "Install Everything" and went to town with 
vulnerability reports :-)

"RHEL4 Reduced Component List"

This analysis more closely assimilates with Vista, but is still bloated 
in that many of the vulnerabilities he reports are very small bugs in 
Firefox, which don't result in a compromise of the host. Again, the 
nature of bug reporting in open versus closed source software.

"Ubuntu"

Again, the nature of open versus closed source bug reporting. However, 
even the kernel flaws reported are only relevant when such modules are 
loaded in the system and that surface is exposed.  Again, the results 
are inflated, even in the "reduced" set.

"Novell"

More of the same.  The vulnerabilities are shared between all the 
distros of course!

"Mac OS X"

Even though OS X claims to be secure, researchers have obviously shown 
that Apple will have flaws too.  This is nature of software, and it 
affects all code.  However, the paper claims that things like the 
vulnerability below are relevant...

<snip>
A bug in AFP Server when using an ACL-enabled storage volume may in
certain situations result in an ACL remaining attached when a file
with POSIX-only permissions is copied.
</snip>

"Putting It All Together"

* insert nice graphs here *

The conclusions that are drawn are built on a lack of understanding by 
the Microsoft researcher.  I highly encourage him to go back and take 
another look, and pare down the results to essential information that is 
absolutely critical to the conclusions, rather than just "Other OS's 
have more bugs, see, look at my graphs"...
--
Kristian Hermansen

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


_____________________________________________________
Attend Black Hat USA, July 28-August 2 in Las Vegas, 
the world's premier technical event for ICT security 
experts. Featuring 30 hands-on training courses and 
90 Briefings presentations with lots of new content 
and new tools. Network with 4,000 delegates from 
70 nations.   Visit product displays by 30 top
sponsors in a relaxed setting. Rates increase on 
June 1 so register today. http://www.blackhat.com



This archive was generated by hypermail 2.1.3 : Tue Jun 26 2007 - 23:28:30 PDT