Learn What IT Pros Need to Know About Windows 11 - August 26th at 1 PM ET! Learn What IT Pros Need to Know About Windows 11 - August 26th at 1 PM ET!
Main|Security|Windows 10|Windows 2000|Windows 7|Windows 8|Windows Client OS|Windows Server|Windows Server 2003|Windows Server 2008|Windows Server 2012|Windows Server 2016|Windows Vista|Windows XP

SCARY: “Atom Bomb” Windows Security Hole said to be Unfixable

Atom Bombing Windows security flaw
An “unpatchable” design flaw? enSilo’s Tal Liberman looks coldly pleased

Windows has an unfixable security flaw. That’s the frightening conclusion of this researcher, who says he can inject code—at will—into browsers and other Windows apps.

It affects all versions of Windows released in the past 16 years, he says. And it can’t be patched, without breaking legitimate desktop apps. It could be bad for containerized server workloads, too.

But is it actually a big deal? In today’s IT Newspro, we loosen the airtight hatchway.

Your humble newswatcher curated these news nuggets for your entertainment. Not to mention: Scray clowns

Sponsored Content

Read the Best Personal and Business Tech without Ads

Staying updated on what is happening in the technology sector is important to your career and your personal life but ads can make reading news, distracting. With Thurrott Premium, you can enjoy the best coverage in tech without the annoying ads.

What’s the story? Richard Chirgwin brings us Windows Atom Tables popped by security researchers:

A security researcher has found a way toinject code into Atom Tables [in] all versions of Windows.A successful attack couldaccomplish quite a lot of evil [by] snooping on the contents of memoryscreen-grabs and browser hijack.

But, uhh, Defender will help, right? Jai Vijayan notes that it doesn’t exploit a vulnerability:

[It] is undetectable to existing anti-malware tools.enSilo’s AtomBombing attack involves the injection of malicious code into the so-called atom tables [in] Windows.The oldest versionthat uses atom tables is Windows 2000.

What does the researcher have to say for himself? Tal Liberman claims it’s a Brand New Code Injection for Windows:

Here’s a new code injection technique. [It] exploits Windows atom tables and Async Procedure Calls.

[We] copy our code to an RW code cave in the target process.Then use a meticulously craftedReturn Oriented Programmingchain to allocate RWX memory.

Not a big problem.We can use ZwAllocateVirtualMemory.The complete implementation can be found on GitHub.

Oh noes. What does Redmond have to say? A spokesperson effected this statement to Charlie Osborne:

We encourage our customers to practice good computing habits online, including exercising caution when clicking on linksopening unknown files, or accepting file transfers. A user’s system must already be compromised before malware can utilize code-injection techniques.

Wait, are you suggesting it’s a lot of fuss about nothing? Ken Hagan seems to agree:

There is nothing you can attack that doesn’t have exactly the same access.So you can only attack processes that you can already control.

So it isn’t really a security vulnerability.I have to assume that this is just someone trying to drum up some publicity.

Phew, panic over? Catalin Cimpanu isn’t quite so sanguine Microsoft can’t patch against AtomBombing technique:

The bad news is that this is a design flaw.Microsoft can’t patch it without changing how the entire OS works.

The last word on the subject? It sounds like something Raymond Chen would counter with It rather involved being on the other side of this airtight hatchway. Lasse V. Karlsen explains:

If you have a cracker that is able to execute codeon your own machine, you have already lost.So no, this is not a vulnerability.

Now, having said thatthere is support for attempts to at least make it harder. [But] if the bad-guy can execute code on your platform, what is there to stop him?

And Finally…

Main image credit: @Tal_Liberman

Related Topics:


Don't have a login but want to join the conversation? Sign up for a Petri Account

Comments (0)

Leave a Reply

Register for Advanced Microsoft 365 Day!

GET-IT: Advanced Microsoft 365 1-Day Virtual Conference - Live August 24th!

Join us on Tuesday, August 24th and hear from Microsoft MVPs and industry experts about how to take advantage of Microsoft 365 at a technical level and dive deep into the features and functionality that will make your environment more secure and compliant.


Sponsored By