Microsoft is aware of public reports of ways to subvert the kernel in Windows Vista

Oct 26, 2006 14:31 GMT  ·  By

And the target of Microsoft's decrying is none other than security developer Authentium. Recently, CTO Helmuth Feericks has admitted that Authentium has circumvented the Kernel Patch Protection in Windows Vista. The move is designed to allow the installation of Authentium's own security solutions and then turn back on the bypassed PatchGuard. Moreover, Feericks has revealed that the circumventing technology will be integrated into Authentium's ESP Enterprise Platform.

Microsoft has criticized Authentium's move and has warned of eventual problems for the implementation of the Palm Beach Gardens-based security maker's software products with Windows Vista. The Redmond Company confirmed its nonnegotiable policy with PatchGuard and reinstated its commitment to patch any flaws in the Kernel Patch Protection that would permit unauthorized kernel interaction. In doing so, Microsoft would render inoperable software that is based on PatchGuard circumvention technologies leaving users unprotected.

"Microsoft is aware of public reports of ways to subvert the kernel in Windows Vista and has addressed them in current builds; however, we have not received any other reports of ways to subvert the kernel in existing builds of Vista," said Adrien Robinson, director of Microsoft's Security Technology Unit. "If a vulnerability is discovered in Kernel Patch Protection, Microsoft will issue a security update as part of the standard Microsoft Security Response Center process."

The only solution delivered by the Redmond Company to mitigate the situation is for the third-party security makers to implement the APIs made available by Microsoft.

"We continue to encourage all software vendors to work with Microsoft on supported design approaches that work with Kernel Patch Protection to ensure that customers can have a secure and reliable computing experience on Windows Vista and Windows XP 64-bit systems, rather than putting customers at risk by developing approaches to try to bypass Kernel Patch Protection and as a result reduce the security protection of Windows," added Robinson.