Linked by Thom Holwerda on Fri 20th Oct 2006 14:35 UTC
Windows Microsoft has blocked the attack vector used to slip unsigned drivers past new security policies being implemented in Windows Vista, according to Joanna Rutkowska, the stealth malware researcher who created the exploit. Rutkowska, who demonstrated the exploit at the Black Hat conference in August, said she tested the attack against Windows Vista RC2 x64 and found that the exploit doesn't work anymore. "The reason: Vista RC2 now blocks write-access to raw disk sectors for user mode applications, even if they are executed with elevated administrative rights," Rutkowska wrote on her Invisible Things blog.
Thread beginning with comment 173597
To view parent comment, click here.
To read all comments associated with this story, please click here.
RE: By by homebrew dev
by NotParker on Sat 21st Oct 2006 00:54 UTC in reply to "By by homebrew dev"
NotParker
Member since:
2006-06-01

this effectively kills homebrew development on Vista, it also locks out all those nice loopback audio drivers used for ripping audio out of programs. Same goes for videos.

Why? This is for write-access to raw disk sectors. Why would those programs want to write to raw disk sectors?

Reply Parent Score: 1

RE[2]: By by homebrew dev
by Ookaze on Mon 23rd Oct 2006 09:53 in reply to "RE: By by homebrew dev"
Ookaze Member since:
2005-11-14

Why? This is for write-access to raw disk sectors. Why would those programs want to write to raw disk sectors?

I don't know, but I know most devices use this method to update firmware, and camcorders control need this too.
So you won't be able to control your camcorder using current software (can someone try it to confirm ?).

Reply Parent Score: 1