HansMustermann
Penultimate Amazing
- Joined
- Mar 2, 2009
- Messages
- 23,741
Well, something may be rotten there, if such an attack got through, I will concede that. As I was saying, this couldn't possibly load on any test computer without crashing it.
Has anyone tried turning it off and switching it back on again?
I'll see myself out.
Having been a professional tester for 7 years it is hard to imagine that getting through test.
If it was going to be an attack why just load a null file? Any simple virus could have caused a lot more damage.Just to kinda duplicate what I wrote in the computers and internet thread, the file doesn't even contain any code that could do anything to cause even more corruption, or really do anything. It's just a long block of 00 bytes, including the DLL file header. (A driver is just a renamed DLL.) It's actually that corrupt header that causes the loader to crash when trying to load it. No code in the driver itself was even executed at this point. Except since it's a system driver, loaded by the kernel with kernel rights, this causes the kernel to fail.
TL;DR version for the everyman: it IS an exploit/attack on the Windows DLL loader, using a malformed file. Just it needs to be a system driver to work, and an update to an anti-virus provided that setup.
Remember the "PrintNightmare" fiasco a little while back? That somehow got through testing and ended up borking printing to network shared printers on 100s of millions of computers all over the world?.
If it was going to be an attack why just load a null file? Any simple virus could have caused a lot more damage.
Who hasn’t accidentally uploaded a wrong file?
Well, I think I answered my own question, after looking at the problem from a new angle and through a new vodka bottle: if you use your own program to copy, download or pack/unpack the file, and THAT one can malfunction like that.
I actually had a problem like that in the 90's, where a manager at the client removed the initialization of my LZ compression/decompression buffer, because he thought he optimized it that way. It didn't produce nulls, but it produced more garbage than Berlin over Easter![]()
Dave, of Dave's Garage, explains the problem. A CrowdStrike update installed at boot that operates at Ring 0 (OS max privilege) had a gross error that accesses memory that doesn't exist. Initiates a BSofD.
Haven't watched the video, but... SORTA... and SORTA NOT. Yes, it did have that level of privilege, but again, no code in it actually did it or even ran at that point. Not that it had any meaningful code to run anyway. It was the loader in Windows itself that did that, due to the malformed PE header. It's not even a guess, people have remote-debugged it.
Yep. Croaked at the git go. So no damage. Just need to boot up in safe mode and remove the bad file. A major screw up but not malware injection.
Yep. Croaked at the git go. So no damage. Just need to boot up in safe mode and remove the bad file. A major screw up but not malware injection.