Sony rootkit may be more dangerous on the way out

Powered by SC Magazine
 

Uninstalling Sony-BMG Entertainment’s spyware-like application from a PC could be more harmful than having downloaded it in the first place, a Princeton University professor warned on Tuesday.

"For affected users, this represents a far greater security risk than even the Sony rootkit," said Ed Felten, a professor of computer science at the Ivy League university and author of the weblog "Freedom to Tinker."

Felten warned that the rootkit remover allows any website to run code onto a PC and take command of it.

"Any web page can seize control of your computer; then it can do anything it likes," Felten wrote on his blog. "That's about as serious a security flaw as you can get."

The uninstaller downloads a program onto PCs called CodeSupport, which remains on a unit after a user leaves Sony's site. The program is labeled as "safe for scripting," Felten contends, so a site can download code onto a PC – without user permission – by using it.

Sony had said earlier this week that it would withdraw the rootkit application from CD-Roms. A media firestorm erupted after Windows security expert Mark Russinovich first reported on the application's existence on his blog late last month.

A number of viruses, which exploited the cloaking code to download software onto PCs, appeared in the weeks following the disclosure. Meanwhile, USA Today has reported that Sony has agreed to pull CDs containing the application from stores and offer exchanges to customers who bought CD-Roms containing the rootkit.

www.sony.com
www.freedomtotinker.com
www.sysinternals.com

Copyright © SC Magazine, US edition


 
 
 
Top Stories
ATO shaves $4m off IT contractor panel
Reform cuts admin burden, introduces KPIs.
 
Turnbull introduces data retention legislation
Still no definition of metadata to be stored.
 
Crime Commission prepares core systems overhaul
Will replace 30 year-old national criminal database.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  27%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  25%
TOTAL VOTES: 433

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  54%
 
No
  46%
TOTAL VOTES: 209

Vote