Windows 10 Bug Corrupts Your Hard Drive On Seeing This File's Icon (bleepingcomputer.com) 96
An unpatched zero-day in Microsoft Windows 10 allows attackers to corrupt an NTFS-formatted hard drive with a one-line command. Bleeping Computer reports: In August 2020, October 2020, and finally this week, infosec researcher Jonas L drew attention to an NTFS vulnerability impacting Windows 10 that has not been fixed. When exploited, this vulnerability can be triggered by a single-line command to instantly corrupt an NTFS-formatted hard drive, with Windows prompting the user to restart their computer to repair the corrupted disk records. The researcher told BleepingComputer that the flaw became exploitable starting around Windows 10 build 1803, the Windows 10 April 2018 Update, and continues to work in the latest version. What's worse is, the vulnerability can be triggered by standard and low privileged user accounts on Windows 10 systems. [...] It is unclear why accessing this attribute corrupts the drive, and Jonas told BleepingComputer that a Registry key that would help diagnose the issue doesn't work.
One striking finding shared by Jonas with us was that a crafted Windows shortcut file (.url) that had its icon location set to C:\:$i30:$bitmap would trigger the vulnerability even if the user never opened the file! As observed by BleepingComputer, as soon as this shortcut file is downloaded on a Windows 10 PC, and the user views the folder it is present in, Windows Explorer will attempt to display the file's icon. To do this, Windows Explorer would attempt to access the crafted icon path inside the file in the background, thereby corrupting the NTFS hard drive in the process. Next, "restart to repair hard drive" notifications start popping up on the Windows PC -- all this without the user even having opened or double-clicked on the shortcut file.
One striking finding shared by Jonas with us was that a crafted Windows shortcut file (.url) that had its icon location set to C:\:$i30:$bitmap would trigger the vulnerability even if the user never opened the file! As observed by BleepingComputer, as soon as this shortcut file is downloaded on a Windows 10 PC, and the user views the folder it is present in, Windows Explorer will attempt to display the file's icon. To do this, Windows Explorer would attempt to access the crafted icon path inside the file in the background, thereby corrupting the NTFS hard drive in the process. Next, "restart to repair hard drive" notifications start popping up on the Windows PC -- all this without the user even having opened or double-clicked on the shortcut file.
Re:People still use Windows? (Score:5, Funny)
I requested the arch, but the holodeck did not show the exit. Maybe file system corruption is the issue?
Re: (Score:3)
Moriarty.
Re: (Score:2)
It's elementary, dear Data.
Bobby MF Tables (Score:4, Funny)
Re: (Score:1)
No, this seems more like the sort of "feature" you morons would use to hide evidence of your sedition.
Seditious AC: "Haha, you'll never catch me now"
FBI Agent 1: "WTF, Where is everything?"
FBI Agent 2: "Just reboot and let chkdsk fix it"
FBI Agent 1: "Oh, that's better. Hmm....what's this on your desktop: overthrowing_government.mp4"
FBI Agent 2: "We're gonna need you to come with us"
Re: (Score:2)
Re: (Score:2)
I have heard that Arch Linux is dark magic.
Re: (Score:2)
Yeah for when I'm that fucking bored. https://wiki.archlinux.org/ind... [archlinux.org]
Re: (Score:2)
Something wrong with Ubuntu?
I personally stay on Windows to ensure I can run any PC game I want. Linux is definitely getting better at this, but it still has a ways to go.
Re: (Score:2, Funny)
Something wrong with Ubuntu?
Yes. Canonical.
Who would a thunk.. (Score:2, Funny)
BSOD would ever be an issue in 2021.
Wait it fucks up storage devices, well at least we have advanced.
Re: (Score:2)
cd Robert/$i30/$clusterfuck
Re: (Score:3, Interesting)
Re:Who would a thunk.. (Score:5, Informative)
Re: (Score:2)
Re: (Score:2)
My guess is that it's a file trigger. :"You're not supposed to be here, so if you are here then something has gone terribly wrong". But then there is nothing stopping you from going there other than the file not being readily listed.
Re: (Score:1)
Re: (Score:2)
Re: (Score:3)
Wait it fucks up storage devices, well at least we have advanced.
"...with Windows prompting the user to restart their computer to repair the corrupted disk records."
Weird that they don't tell us the results of that repair. Is it just business as usual afterwards or is the whole disk gone?
didn't mac system 6 have an bug like this? (Score:2)
didn't mac system 6 have an bug like this? where if you named an file in the right way it messed up the HDD?
Re: (Score:2, Redundant)
System 6 was ~30 years ago.... https://en.wikipedia.org/wiki/... [wikipedia.org]
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
Even earlier I think - maybe going all the way back to the original Mac System 1.
Basically to support disk drivers transparently, you can name the driver .something (dot-something, like dotfiles on Unix) and the OS would use it as a disk driver.
The danger is that .SONY (dot-SONY) is the floppy disk driver. If you happen to name a file that, bad things happen as MacOS mistakes that file as the driver f
Re:Windows 10: Suffers from AMAZINGLY bad manageme (Score:4, Insightful)
Um, Windows is made by Microsoft, not Intel.
Re: (Score:2)
I'd call that bad management, in and of itself.
Re: (Score:2)
Thanks! I posted the wrong HTML.
Somebody needs to debug your copy paste bot. Maybe you could replace it with a human being who reads articles and posts relevant responses rather than just copying and pasting links like a troll.
Re: (Score:1)
Toyota suffers from AMAZINGLY bad management.
Just look at Richard J. Kramer the CEO of Goodyear!
What a great case you have.
Re: (Score:1)
MS "quality software".... (Score:1)
Why these incompetent cretins have not gone bankrupt already is really beyond me.
Re: (Score:3)
Re: (Score:2)
Inertia. Learning a new system is a hassle, so people stick to what they already know. Even if it's crap.
Re: (Score:2)
It's developer adoption. Mac's lock software vendors into their "App Store" with it's god awful crippling terms of service and use Objective-C for their core API language, Chrome book again locks you into their app store and pumps out hardware that is barely adequate for web surfing. Microsoft is the only major player still agnostic in regards to where you get your software and do I even have to mention how much better MSDN is compared to literally anyone else out there in regards to documentation?
Re: (Score:2)
No one (for most definitions of no one) uses the Mac App Store, and Macs can still install applications from anywhere, built using any language.
Wow (Score:2)
The more you think about it, the crazier it gets. The file system will corrupt if you try to READ an invalid file.
Re:Wow (Score:5, Informative)
It's not even an invalid file. C:\:$i30:$bitmap is part of the root directory on drive C:. NTFS supports alternative streams, so $i30 describes the actual index of the directory, and the allocation bitmap part of that index. Actually, every time you open C:\, C:\:$i30:$bitmap is opened behind the scene.
They might not be stupid enough to open the specified stream in read/write mode, but I imagine opening it creates some lock on the stream, which could then somehow cause a desynchronization between $INDEX_ROOT, $INDEX_ALLOCATION and $BITMAP.
Documentation:
Archive of the linux-ntfs project, directory page [flatcap.org]
NTFS streams [microsoft.com]
Stream types [microsoft.com]
Thanks (Score:2)
Thanks for the info. I was curious how it worked.
I've read about alternative stream exploits and steganography recently.
Re: (Score:3)
Re: (Score:2)
Here in my part of the US at least, we call it deadlock instead of deadly embrace.
It makes it easier to say "this has entered into a deadlock condition", and code using that word. Deadly embrace is more poetic, but a bit harder to work into a logical flow.
Deadlock detection is a basic part of a lot of operating system design. Either works fine though.
Ryan Fenton
calm down (Score:1)
Re: (Score:2)
Solution is clear. (Score:2)
Re: (Score:2)
Was going to post the same. I've heard that simply not installing on C: prevents most malware attacks as well.
Re: (Score:2)
The D:\ drive has its own D:\:$i30:$bitmap file.
Re: (Score:2)
Re: (Score:3)
It it were me I'd spam everything except drive C:, just to show those idiots who think they're safe because they used D:
Re: (Score:2)
Yes, but all the browser and mail attacks will be targeting C:\:$i30:$bitmap because most Windows computers boot from C: drive. Of course some smart ass will spam all 26 drive letters.
Your "yes, but" solution, didn't even make it to the end of your comment before being dismantled?
Thanks a lot, Helpy Helperton. ;-)
Re:Solution is clear. (Score:5, Informative)
True to NT's was rooted in VAX/VMS. The VAX/VMS FILES-11 disk structure contains the same type of file, named BITMAP.SYS, for each volume. https://www.itec.suny.edu/scsy... [suny.edu]
Apparently the NT designers felt putting a $ in names was a reasonable way to hide file names and network shares from ordinary list requests. So this latest bug follows an old IIS exploit using $ in a Alternate Data Stream suffix on a URL to the webserver. https://owasp.org/www-communit... [owasp.org]
The $ will keep the users away from these important, hidden things! Hail the mighty dollar sign!
Re: (Score:2)
Re: (Score:2)
The $ will keep the users away from these important, hidden things! Hail the mighty dollar sign! :)
Or in the case of *nix, hail the mighty dot!
Headache (Score:3)
When reading the article and the part on C:\:$i30:$bitmap causes a headache then it's because the brain was formatted with NTFS and is running Windows.
Oh please ... (Score:3)
Re: (Score:2)
Cursed Image (Score:1)
Comments in article say Windows fixes it (Score:5, Interesting)
"On all three this command returned the result "the file or directory is corrupted and unreadable," with a Security and Maintenance prompt to restart the device. Upon doing so Windows managed to scan and repair the drive successfully on every attempt, usually in a matter of seconds, and have me back at the Windows login screen within a minute. I tested this multiple times on each machine, in some cases running the command in excess of ten times before restarting, and not once did the drives break in such a way that they were unrecoverable. I'm not saying this isn't a problem or its sensationalized, however the testing I did showed no instance of the drives becoming corrupted beyond repair, or something that Windows couldn't fix in the usual way."
Comment removed (Score:5, Informative)
Re: (Score:3)
Re:Affects as far back as Windows XP at least (Score:5, Insightful)
It appears to be an NTFS based issues as opposed to a Windows 10 thing.
(Of course, who cares about a dead OS, but it's interesting nonetheless.)
Yup. It is not even a corruption. Chkdsk does not find and fix any errors.
I strongly suspect that it is not a corruption at all, but a fault inside NTFS (probably because the access to the alternate datastream will hold a lock), which only flags an operation as faulted, in turn flagging the drive as potentially corrupted.
Re: (Score:2)
The comment here [bleepingcomputer.com] says: "On all three this command returned the result "the file or directory is corrupted and unreadable," with a Security and Maintenance prompt to restart the device. Upon doing so Windows managed to scan and repair the drive successfully on every attempt, usually in a matter of seconds, and have me back at the Windows login screen within a minute. I tested this multiple times on each machine, in some cases running the command in excess of ten times before restarting, and not once did the drives break in such a way that they were unrecoverable. I'm not saying this isn't a problem or its sensationalized, however the testing I did showed no instance of the drives becoming corrupted beyond repair, or something that Windows couldn't fix in the usual way."
Try it on multiple builds? Multiple versions of WinXP - Win10? Try it on encrypted drives, whether encrypted with Bitlocker or 3rd party?
(That last one I'm really curious about.)
Re: (Score:2)
I think it depends on whether there is actual corruption or if whatever error is thrown triggers a failsafe to check for corruption just in case - only for that check to come back clean.
Re: (Score:3)
I'd love to know why this causes corruption. The path looks like it is accessing some hidden part of the filesystem that normally would not be accessible, maybe something like the block allocation bitmap.
It should just be a read though, no reason to write to it and corrupt it. I wonder if maybe it's not really corruption, just that when accessed this way Windows marks it as potentially broken and wants to check it, or restore from the backup copy (all important stuff is duplicated in NTFS).
Dating myself (Score:5, Funny)
I hopped on to my Linux box and crafted an HTML email containing a single IMG tag with a SRC attribute containing "c:\con\con". I sent it to our support address. I type pretty fast, so I'm not sure they really saw what I did. It only took a few seconds to compose.
I said "done" and they looked at me in disbelief, then wondered back to the support area. A few seconds later I hear raised voices shouting at each other and I wonder out. 8 of 9 computers were displaying a nice blue screen...
8 of the 9 techs owed me a coffee. One tech used Pegasus or something like that. I got chewed out a few hours later because I took down the support office and the techs all had to download a different mail client, sign in to their IMAP box, delete the offending message, and then start using Outlook or Outlook Express again. I forget which one they were using at the time...
Re: (Score:3)
That only worked on Windows version built on top of DOS (95, 98, possibly ME), which never had any half-decent security, not versions based on the NT kernel.
Re: (Score:3)
Re: (Score:3, Funny)
Back in the day my highschool physics teacher was also the network administrator for the school. He let me and another kid install a FreeBSD server (3.0 maybe?) on the school network that was running some version of Netware and an IPX/SPX network. We set the FreeBSD box up to NAT a single IP address to give TCP/IP and internet access to the physics lab. It was pretty cool, and I can't imagine that kind of network access would be allowed anywhere today. (We even got credit for it as an independent study.)
Any
Re: (Score:2)
But back then around the time Windows 95 came out and all these college students hooked that insecure piece of crap up to their dorm internet connections and left everything wide open it was a
Re: (Score:2)
Ah, I remember the days of the Ping of Death. Someone would be being a jackass on IRC or in the lab and you could just PoD them at the worst possible moments.
There was a chat log going around years ago where some script kiddie, armed with his ping of death, was taunting some victim to disclose his IP address. The" victim" replied he was at 127.0.0.1. Script kiddie shortly dropped offline.
I don't know if it was real or faked, but it was funny as hell anyway.
Re: (Score:2)
Outlook had a bug where if any line started with "begin " (two spaces) it would assume everything after that was an attachment. You could troll Outlook users just by making your quote header something like "begin quoting :".
Re: (Score:2)
You could troll Outlook users just by making your quote header something like "begin quoting :".
Evidently you foil your attempts by simply downloading a webserver, the slash code, creating a slashdot mirror site, setting up your email server to simply post all emails into the /. comment section and then setup auto email reminders when you need to read a comment.
Bam problem solved, never see two spaces again. :) - there's two spaces before this smiley.
Re: Dating myself (Score:2)
No Errors on my WinXP and Win10? (Score:2)
Re: (Score:2)
Re: (Score:2)
Wouldn't the VM itself (usually) use NTFS within Windows, and therefore be fully susceptible to this? (The exception would be if Windows was installed on a filesystem other than NTFS. FAT32 is still an option for the boot drive, right?)
VMFS would be the filesystem used by VMware itself, but Windows wouldn't know anything about that -- as far as it's concerned, it's got a hard drive of X GB, and its data partitions are (probably) formatted with NTFS if they're meant to be used with Windows.
It does look lik
why do people insist on calling all bugs zero-day? (Score:4, Informative)
How many mistakes can someone make in the first 4 words "An unpatched zero-day ...."?
1. An unpatched zero-day what? OK, we know it is an exploit.
2. If it was a zero-day exploit it would not have 3 publications.
3. If it was a zero-day exploit it could not be patched by definition.
Re:why do people insist on calling all bugs zero-d (Score:4, Informative)
In this particular case, as the OP shows, Microsoft have been aware of the issue since at list 2018. Ergo, it cannot by definition be described as a "zero day".
Sigh. (Score:3)
Ah, it's like having file references to CON: or PRT: or LPT: all over again.
Not corruption (Score:5, Informative)
The bug appears to be that some fault generated within NTFS when executing the command is being wrongly diagnosed by NTFS as drive corruption. The drive is not actually being corrupted. NTFS flags the drive as potentially corrupted and that is what generate the warning to reboot and run chkdsk.
Several users trying to reproduce this have not been able to actually corrupt the drive, for instance: https://www.bleepingcomputer.c... [bleepingcomputer.com]
Re: (Score:3)
I tried it on an external flash drive. All I got was an error that the \:$i30:$bitmap file was missing or corrupt. Nothing else. The test files I put on the flash drive were still intact and readable.
The Year of the Linux Desktop is Here! (Score:2)
Fake? (Score:2)
Tried on 2004. It went exactly as the video on the article, and after one last reboot the machine was back, as if nothing happened, even with my "bad shortcut" on the desktop.
Is this "bug" relevant? Anyone else cared enough to just try it?
"Corrupts the hard drive" is too strong a term (Score:3, Informative)
It did not "corrupt the hard drive", it created a corrupt file, which the OS easily fixed. Unless there is a more potent way to exploit this, but I think the language used in this article is much stronger than is warranted.
Best OS Ever! (Score:1)
Except for all the others.
"No one will ever..." - Famous last words (Score:1)
NTFS is pretty brittle if you know where to poke it. What's even worse is that the NTFS driver haven't been updated in years with any improvements and safety/security checks. It was bound to happen people would stumble upon a weakness eventually. It's very easy to corrupt an NTFS volume. If you have raw disk write access there are several ways you can do evil things. Requires around a page if code and rudimentary level of the NTFS and how it works.
Some defragmentation programs play a dangerous game of using