The two zero-days were fixed in the summer of 2015.Project Zero researchers revealed this week that they helped Microsoft patch 16 security issues relating to how font processing operations are handled in the Windows kernel, 2 of which were zero-day vulnerabilities at the time they were discovered.
Project Zero is an initiative to help improve the security of crucial software. The project is sponsored by Google, and in the past, it managed to help fix critical vulnerabilities in many open- or closed-source projects such as important open source code libraries or high-end antivirus products.
In a blog post published a few days ago, the project’s researchers revealed the methodology through which they managed to discover 16 issues in the way Windows handles fonts.
Fonts and font processing operations are an old problem within the Windows OS, but which has not received a lot of media attention compared to other vulnerabilities.
The issue at the core of this problem is the fact that Windows executes all font processing operations in the kernel’s ring-0 with the highest level of permissions. A vulnerability in any of the libraries or operations would immediately give an attacker direct access to the whole OS.
Microsoft slowly became aware of this problem and started to improve its products. It first moved the font engine out of the kernel starting with Windows 10 and also moved font processing operations into a sandboxed environment running in a user-mode process. Unfortunately, the problem of font processing, even if limited in Windows 10, has remained for older OS versions.
At the start of 2015, Google’s Project Zero started a massive security testing process of the Windows font processing system. The company’s experts reported their discoveries to Microsoft in May 2015.
Google’s experts discovered issues with how Windows was processing OTF and TTF fonts. The full bugs are listed in the table below.
Out of these, the first two were also used in live attacks (zero-day vulnerabilities) at the time Google discovered them.
The first is CVE-2015-2426, a security bug that Microsoft fixed in July 2015 via MS15-078. What Google engineers didn’t know is that the bug they stumbled upon was also found months or years earlier by the Hacking Team.
A month after Google reported this issue to Microsoft, a hacker by the name of Phineas Fisher would breach the Hacking Team’s servers and leak their entire database, including this zero-day exploit.
The second zero-day Project Zero engineers found was CVE-2015-2455. Microsoft would fix this issues as well, in August 2015, via MS15-080.
By the time it fixed the issue, this bug too would become public after the Keen Team would use it in the Pwn2Own competition.
To find these vulnerabilities, Google’s engineers said they only used fuzzing techniques, basic procedures for findings bugs in software code. The fact that a few fuzzing tests exposed these issues and that multiple entities were able to discover these bugs only shows the lack of any proper security testing that the font engine received.
This probably explains why, in the past years, there have been so many security issues reported in this component. The good news is that, at least with Windows 10, the font engine won’t have direct access to the kernel anymore.
“If there is a family of software so fragile and yet widely deployed and accessible, that most security professionals can just hop in and easily find a convenient 0-day bug and use it in targeted attacks or mass campaigns, something is clearly wrong,” Google’s researchers explained, detailing the sad state of font processing operations on Windows.
Source:https://news.softpedia.com/
Working as a cyber security solutions architect, Alisa focuses on application and network security. Before joining us she held a cyber security researcher positions within a variety of cyber security start-ups. She also experience in different industry domains like finance, healthcare and consumer products.