Microsoft quietly beefed up a key defensive feature of 64-bit Windows Vista Tuesday to better protect the operating system against hacks that have plagued it for weeks.
The update to Vista's Kernel Patch Protection, a.k.a. PatchGuard, was issued through Windows Update as a high-priority download, but not as a patch per se. Microsoft, in fact, denied that it was a security fix. "While this updates adds additional checks to the Kernel Patch Protection system, it does not involve a security vulnerability," an advisory posted Tuesday by the Microsoft Security Response Center (MSRC) stated. "The update does increase the reliability, performance, and resiliency provided by Kernel Patch Protection."
Although the update targets all 64-bit editions of Windows, it's Vista that stands out by reason of recent events. Since late July, a pair of utilities have sidestepped a crucial Vista security feature that requires drivers to be signed by a valid digital certificate. Both utilities piggybacked unsigned code onto a legitimate driver to get the former past Vista's defenses and into the kernel.
First off the mark four weeks ago was Australian developer Linchpin Labs, which released Atsiv (Vista spelled backward), a utility that allowed users to load unsigned drivers to the Vista kernel. Within days, Microsoft had the certificate revoked, forcing Linchpin to throw in the towel.
Next, Canadian researcher Alex Ionescu last week took advantage of a flaw in a Vista video driver from Advanced Micro Devices' ATI Technologies unit to unveil Purple Pill, another utility that allowed unsigned drivers to be loaded into the kernel. Ionescu quickly pulled Purple Pill once he realized that the ATI driver had not been patched.
"[Purple Pill] had embedded in it an ATI signed driver that would be dropped to disk and loaded (a similar approach to Atsiv)," said Symantec analyst Ollie Whitehouse in a posting to the company's security blog last week. "However, it would appear that this signed driver contained a design error, which allows you to use it to load any arbitrary driver even if they are not signed."
For its part, ATI refreshed its Catalyst video driver for Vista on Monday to patch against a repeat of Purple Pill, fulfilling a promise made earlier by AMD in a statement posted by ZDNet blogger Ryan Naraine.
While Catalyst 7.8 may have plugged the hole in ATI's driver, more driver vulnerabilities or design flaws would likely be found, or others would take the Atsiv approach and pay the money for a certificate. "Let's hope Microsoft steps in and uses Windows Update as an upgrade mechanism for them," Whitehouse said in a post Tuesday.
But that's not what appears to have taken place Tuesday as Microsoft updated PatchGuard, he added in an e-mail exchange early Wednesday.
"There is very little, if anything, Microsoft can do to stop the piggybacking [of drivers] if someone is willing to go to the effort of obtaining a signing certificate for their own driver," said Whitehouse. "The only real thing Microsoft could do to improve this process would be... to start performing code reviews of all drivers wishing to be signed. But in reality it's not scalable. Even then, it would become a game of cat and mouse with regards to individuals determined to get code through the review process."