Researcher Long Zheng has posted both a description and a proof of concept for an issue which could allow an attacker to skirt the User Account Control (UAC) component in the new version of Windows.UAC is designed to monitor a system and notify the user when a program attempts to alter the system. Originally designed to help prevent malware infections, the software was disabled by many users and widely mocked for the barrage of dialog boxes it created in some systems.To improve the software in Windows 7, Microsoft has set new guidelines for UAC which allow changes to Windows settings but require authorization to otherwise alter the system.The problem, explains Zheng, is that UAC itself is controlled through system settings. This, argues the researcher, can allow an attacker to completely disable the protections without user notification."We soon realised the implications are even worse than originally thought," Zheng wrote."You could automate a restart after UAC has been changed, add a program to the user’s startup folder and because UAC is now off, run with full administrative privileges ready to wreak havoc."The researcher notes that the issue can be easily fixed by changing the UAC setting to notify users when Windows settings are altered, and that Microsoft could remedy the problem by prompting the user when the UAC setting is altered. However, Zheng alleges that Microsoft is dismissing the report, and that the problem may go unfixed."The reason I’m blogging about this flaw is not because of its security implications, it is blatantly simple to fix, but Microsoft’s apparent ignorance towards the matter on their official Windows 7 beta feedback channel by noting the issue as 'by design' and hinting it won’t be fixed in the retail version," the researcher wrote.At the time of publication, Microsoft had yet to return a request for comment on the UAC security issue or Zheng's posting.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED GOES EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @itnews.com.au to your white-listed senders.