Microsoft urges death of Windows gadgets as researchers plan disclosures
Reacts to upcoming revelations of gadget vulnerabilities at Black Hat by offering tool that kills feature in Vista, Windows 7
Computerworld - Just two weeks before researchers are to disclose bugs in Windows "gadgets" at Black Hat, Microsoft acknowledged unspecified security vulnerabilities in the small pieces of software supported by Vista and Windows 7.
To deal with the vulnerabilities, Microsoft has provided a way to cripple all gadgets and disable the "sidebar" engine that runs them.
"The purpose of this advisory is to notify customers that Microsoft is aware of vulnerabilities in insecure Gadgets affecting the Windows Sidebar on supported versions of Windows Vista and Windows 7," Microsoft said in a security warning issued Tuesday.
"The deprecation of gadgets and the sidebar is interesting," said Jason Miller, manager of research and development at VMware, in an interview. "Gadgets are not much used for business, so if you don't use it, get rid of it. That's one of the best ways to reduce your attack profile."
Microsoft did not detail the vulnerabilities or explain why it was letting users ditch gadgets, but the move may be linked to an upcoming presentation at Black Hat, the annual security conference held in Las Vegas. On July 26, Mickey Shkatov and Toby Kohlenberg are scheduled to present research on gadget flaws and exploits.
The Black Hat entry for their presentation, "We Have You by the Gadgets," noted "a number of interesting attack vectors" in gadgets.
"We will be talking about our research into creating malicious gadgets, misappropriating legitimate gadgets and the sorts of flaws we have found in published gadgets," the description stated.
In its advisory, Microsoft thanked Shkatov and Kohlenberg for their help with gadget bugs. The researchers were unavailable for comment or to answer questions late Tuesday.
Gadgets and the sidebar engine were introduced in 2007's Windows Vista as a way to run and manage single-use, lightweight applications. Windows 7 also supported gadgets, but let users place them directly on the desktop rather than on the separate sidebar.
At their debut, some critics noted gadgets' similarity to the widgets and Dashboard introduced two years earlier by Apple in OS X 10.4, also known as Tiger.
While touted by Microsoft before the launch of Vista, gadgets never caught on with users. It was thus no surprise when Microsoft announced last fall that it was pulling support of gadgets from Windows 8. At the same time it retired the Windows Live Gallery, a source for desktop gadgets.
The Windows website, which until Tuesday described how to obtain gadgets, now warns users. "Gadgets installed from untrusted sources can harm your computer and can access your computer's files, show you objectionable content, or change their behavior at any time," said the site.
Microsoft offered users a "Fixit" -- one of its automated configuration tools -- that disables the sidebar and all gadgets in Vista and Windows 7. The tool can be found on this page of Microsoft's support site.
"My first take was that Microsoft was admitting that it's very difficult for a third-party developer to securely write a gadget," said Andrew Storms, director of security operations at nCircle Security. "So they're disabling them all. Thank goodness for that."
This was not the first time that Microsoft has reacted to security problems in gadgets. More than four years ago, Microsoft updated Vista with a tool that let the company automatically -- and remotely -- disable suspicious or malicious gadgets.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, on Google+ or subscribe to Gregg's RSS feed . His email address is email@example.com.
Read more about Application Security in Computerworld's Application Security Topic Center.
- The DDoS Threat Spectrum Bolstered by favorable economics, today's global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously.
- How to Keep Company Assets Secure with Federated Identity and Access Management This Technology Spotlight discusses the growing need for security in today's cloud-based, mobile world of IT, and the rise of SaaS-based solutions.
- Security, Privacy and Trust in Email Management This white paper discusses a SaaS-based email management solution that delivers the security, continuity and archiving capabilities your organization demands.
- Unifying Secuirty Operations Agile enterprises know that the way to quickly identify and react to threats to the business is to break down operational siloes by...
- What Does it Take to Deliver a Superior Customer Experience? The Two Top-Rated Online Retailers, B&H Photo and Crutchfield Electronics, Share Their Secrets Discuss practical CX tools and service methods such as contact center agents and the use of realtime speech analytics to help contact center...
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily... All Application Security White Papers | Webcasts