From: MEB on
On 02/15/2010 02:31 PM, MEB wrote:
> On 02/15/2010 04:38 AM, David Kaye wrote:
>> "The Real Truth MVP" <trt(a)void.com> wrote:
>>
>>> The Malicious Removal Tool does detect and remove Win32/Alureon family, that
>>> Peter Foldes troll does not check his facts before he posts. MS is not 100%
>>> sure why the patch has caused crashing but a common finding is that Trojan.
>>> They are still investigating. Give them some time there are many factors to
>>> look at.
>>
>> My feeling is that given the hundreds of different kinds of motherboards,
>> dozens of kinds of memory, video cards, audio cards, resulting in hundreds of
>> thousands of combinations -- it's a wonder that Windows works at all.
>>
>
> Along those lines; Windows STILL isn't working all that well. These are
> the apparent vulnerabilities un-addressed and/or left/found directly
> after the massed patches last Tuesday and/or as otherwise shown.
>
> http://www.us-cert.gov/cas/bulletins/SB10-046.html
> (see prior week summaries for other factors)
>
> Compare with:
>
> Microsoft Security Bulletin MS10-015 - Important
> Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege
> (977165)
> http://www.microsoft.com/technet/security/Bulletin/MS10-015.mspx
>
> http://www.microsoft.com/security/updates/bulletins/
>
> Security updates - Updated: July 14, 2009
> http://www.microsoft.com/protect/computer/updates/bulletins/default.mspx
>
> Microsoft Security Bulletin Summary for February 2010
> Published: February 09, 2010 - Updated: February 10, 2010
> http://www.microsoft.com/technet/security/bulletin/ms10-feb.mspx
>
>
> As for the BSoD, one must keep in mind that the "major" changes made
> with this massed patching were kernel related, a deep change in the
> basic functioning of Windows 086 coding, AND the core functioning of
> several parts of applications or the OS extensions.
> Yes, perhaps Microsoft should have tested deeper and longer, but the
> issues being addressed are/were essential to the CORE functioning of
> Windows NT operating systems which existed for several versions of OSs
> [the 17 year old vulnerability], one of which is the 16bit coding
> vulnerability [ex., backwards compatibility] which so many Windows users
> *have DEMANDED* Microsoft continue.
> This isn't the first time a Microsoft patch BSoDed one of its OSs, nor
> will it be the last. The hardware CAN be part of the update issue, as
> well as individuals' settings, and/or other found within the
> individuals' computer such as the applications which might be installed,
> in ADDITION to the malware that might be involved.
>
> One factor that many Windows users are conveniently overlooking is the
> apparent FACT that their systems MAY have been or DO have severe
> malware/hack issues, which either their AV did NOT protect them from or
> advise them of, or which came, perhaps, with their pirated software or
> otherwise became installed. OBVIOUSLY, Microsoft would not include this
> malware in its legitimate distributions so the users should look more
> towards their own activities.
>

How about an interesting update to the issue.

BSOD after MS10-015? TDL3 authors "apologize" - Feb. 16 2010
http://www.prevx.com/blog/143/BSOD-after-MS-TDL-authors-apologize.html

Seems the rootkit developers have already fix the BSoD so you can
install the update while leaving the rootkit installed and intact.
Now THERE is a group that is concerned about you [cough].

--
MEB
http://peoplescounsel.org/ref/windows-main.htm
Windows Info, Diagnostics, Security, Networking
http://peoplescounsel.org
The "real world" of Law, Justice, and Government
___---
From: David Kaye on
Geoff <geoff(a)invalid.invalid> wrote:

>It looks like your machines were infected with a rootkit called
>Tidserv.

This also explains why my own machines were not affected in the slightest.
Okay, I'm sorry, Microsoft. You win. You put out a good patch.

From: Geoff on
On Wed, 17 Feb 2010 23:54:31 GMT, sfdavidkaye2(a)yahoo.com (David Kaye)
wrote:

>Geoff <geoff(a)invalid.invalid> wrote:
>
>>It looks like your machines were infected with a rootkit called
>>Tidserv.
>
>This also explains why my own machines were not affected in the slightest.
>Okay, I'm sorry, Microsoft. You win. You put out a good patch.

Apparently the malware was calling a kernel function using a
hard-coded address. This is typical of shellcode exploits. The patched
kernel probably moved the location of that function and when the
malware jumps into the new kernel code it crashes the machine. I
expect to see a more detailed analysis soon.

I don't know if you tried booting into the command prompt safe-mode or
not but you might try that but if the same kernel is used or the
rootkit has a chance to start you may end up with just another BSOD.

Presence of the rootkit is just another example of the failure of
reactive malware detection or out of date A-V products and of the
failure to use secure coding practices as part of the development
process.
From: David Kaye on
Geoff <geoff(a)invalid.invalid> wrote:

>I don't know if you tried booting into the command prompt safe-mode or
>not but you might try that but if the same kernel is used or the
>rootkit has a chance to start you may end up with just another BSOD.

On one machine I couldn't even get to safe mode. On the other it was spotty;
sometimes it would boot and sometimes hang.

From: MEB on
On 02/17/2010 06:54 PM, David Kaye wrote:
> Geoff <geoff(a)invalid.invalid> wrote:
>
>> It looks like your machines were infected with a rootkit called
>> Tidserv.
>
> This also explains why my own machines were not affected in the slightest.
> Okay, I'm sorry, Microsoft. You win. You put out a good patch.
>

Well that may not necessarily be true, many computers MAY be infected
and did not BSoD depending upon when the updates to Windows process was
done. The patched rootkit was distributed within a matter of hours after
the first complaints of BSoD issues surfaced. Hence many users may still
be infected.

--
MEB
http://peoplescounsel.org/ref/windows-main.htm
Windows Info, Diagnostics, Security, Networking
http://peoplescounsel.org
The "real world" of Law, Justice, and Government
___---