AMD patches ATI Vista driver flaw

Vulnerability in ATI video driver could have allowed rootkits to run in Vista kernel.

AMD has released a patch for its ATI video drivers that could allow hackers to load malware directly into Windows Vista kernel.

The flaw was discovered by security expert Joanna Rutkowska and demonstrated at the Black Hat conference last week. Another security researcher Alex Ionescu later released a proof-of-concept tool called Purple Pill that created a way of loading and unloading unsigned drivers into Vista, circumventing anti-rootkit protection that is part of Microsoft's new operating system. Ionescu promptly pulled the tool when he discovered that the flaw was not yet patched.

Advertisement - Article continues below

The flaw lies in an ATI driver called atismxx.sys, version 3.0.502.0. The vulnerability allows certain signed driver verifications for proper ATI software operations to be turned off. The exploit in the video driver could allow hackers to gain kernel access to the operating system.

According to media reports, an AMD spokesman confirmed the bug resided in a file in the installer package and would be releasing an updated version of the ATI Catalyst package today that resolved the vulnerability. He strongly urged users to download the patch to Catalyst version 7.8 from this website.

Ollie Whitehouse, a security researcher at anti-virus firm Symantec said that the tool had embedded in it a ATI signed driver that would be dropped to disk and loaded into the kernel.

Advertisement
Advertisement - Article continues below

"It would appear that this signed driver contained a design error which allows you to use it to load any arbitrary driver even if they are not signed," said Whitehouse. "You can imagine this came about due to a requirement to extend this core driver with arbitrary modules in ATI's design. However this has now come back and bitten them, and more so Microsoft, quite badly."

Whitehouse said that ATI would probably have to get a new certificate, sign fixed versions of all their affected drivers, and release them via Windows Update. "Only then can Microsoft get VeriSign to revoke the signing certificate. My stopwatch has started," he added.

definition update

Featured Resources

Key considerations for implementing secure telework at scale

Identifying the security risks and advanced requirements of a remote workforce

Download now

The State of Salesforce 2020

Your guide to getting the most from Salesforce

Download now

Fast, flexible and compliant e-signatures for global businesses

Be at the forefront of digital transformation with electronic signatures

Download now

Rethink your cybersecurity strategy for the new world

5 steps to secure the enterprise and be fit for a flexible future

Download now
Advertisement

Recommended

Andrew Daniels joins Druva as CIO and CISO
Cloud

Andrew Daniels joins Druva as CIO and CISO

22 Jul 2020
University of California gets fleeced by hackers for $1.14 million
ransomware

University of California gets fleeced by hackers for $1.14 million

30 Jun 2020
Australia announces $1.35 billion investment in cyber security
cyber security

Australia announces $1.35 billion investment in cyber security

30 Jun 2020
CSA and ISSA form cyber security partnership
cloud security

CSA and ISSA form cyber security partnership

30 Jun 2020

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

3 Aug 2020
How to use Chromecast without Wi-Fi
Mobile

How to use Chromecast without Wi-Fi

4 Aug 2020
Police use of facial recognition ruled unlawful in the UK
privacy

Police use of facial recognition ruled unlawful in the UK

11 Aug 2020