News
News
1/17/2006
05:49 PM
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Windows Wi-Fi Flaw Lets Others See Your Stuff

Windows XP and 2000's techniques for looking for wireless connections can be used by attackers to read unsuspecting targets' hard drives.

A security researcher warned over the weekend that the way Windows XP and 2000 look for wireless connections can be used by hackers to dip into unsuspecting users' hard drives.

Calling the flaw a "configuration error" rather than a true vulnerability, researcher Mark Loveless claimed that when Windows powers up but doesn't find a wireless access point, it creates an ad hoc network, complete with the SSID, the Wi-Fi network identifier, like "linkysys" or "actiontec," of the last network connection.

Other laptops, when set to sniff for the same SSID, can listen for such connections, and when they find one, create a peer-to-peer link between the two PCs, said Loveless. Once connected, the attacker could conceivably introduce malicious code and/or access files on the laptop's hard drive.

"In Windows 2000 and Windows XP and [XP] SP1, this all happens in the background without the user's knowledge," Loveless said in his notes on the bug. "On Windows XP SP2, the user is notified it has 'attached' to an ad-hoc network, when in fact it has simply started advertising the ad-hoc network."

Loveless also claimed that in real-world tests, he would have been able to connect to 11 different laptops on four airline flights.

Microsoft, said Loveless, was notified of the problem in mid-October, and since has not only confirmed the issue, but said it would address it in the next Service Pack. That's not saying much, however, since Windows 2000 will have no new Service Packs, while the next for Windows XP, SP3, won't release until late 2007.

In the meantime, he recommended that users disable wireless when it's not used, or set Windows' wireless to connect only to access points, not individual notebooks.

To do the latter, click on the wireless icon in the System tray, and open the Wireless Network Connection Properties window. Click on the Wireless Network tab, click on the Advanced button, and click on "Access point (infrastructure) networks only."

An even easier way to block the "feature," said security experts Tuesday, is to use any firewall, even Windows XP's default firewall.

Comment  | 
Print  | 
More Insights
The Agile Archive
The Agile Archive
When it comes to managing data, donít look at backup and archiving systems as burdens and cost centers. A well-designed archive can enhance data protection and restores, ease search and e-discovery efforts, and save money by intelligently moving data from expensive primary storage systems.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Elite 100 - 2014
Our InformationWeek Elite 100 issue -- our 26th ranking of technology innovators -- shines a spotlight on businesses that are succeeding because of their digital strategies. We take a close at look at the top five companies in this year's ranking and the eight winners of our Business Innovation awards, and offer 20 great ideas that you can use in your company. We also provide a ranked list of our Elite 100 innovators.
Video
Slideshows
Twitter Feed
Audio Interviews
Archived Audio Interviews
GE is a leader in combining connected devices and advanced analytics in pursuit of practical goals like less downtime, lower operating costs, and higher throughput. At GIO Power & Water, CIO Jim Fowler is part of the team exploring how to apply these techniques to some of the world's essential infrastructure, from power plants to water treatment systems. Join us, and bring your questions, as we talk about what's ahead.