Ubisoft: We Didn't Install a Rootkit on Your PC
July 30, 2012 4:50 PM
comment(s) - last by
But Ubisoft admits its code allows remotely controllable arbitrary executable launches
defines a "
" as "a stealthy type of malicious software designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer."
We just heard back from a spokesperson from Ubisoft Entertainment S.A. (
) regarding claims that dozens of its most popular titles contained
a browser plugin that acted as a rootkit
There was some skepticism among readers regarding whether this was a true "rootkit". Writes
, "The described behavior of the DRM package doesn't define a rootkit at all. It may be an evil nonetheless, but let's be accurate here instead of using the R-word to inflame people by misdirection."
But it appears as more details have become available that the software was acting relatively close to the aforementioned definition of a rootkit, though it's likely closer to an unintentional Trojan by definition.
According to the Ubisoft spokesperson:
The browser plugin that we used to launch the application through Uplay was able to take command line arguments that developers used to launch their games while they're being made. This weakness could allow the application to specify any executable to run, rather than just a game. This means it was possible to launch another program on the machine.
Pre-patch the uPlay browser plug-in could allow remotely controlled arbitrary executable launch.
[Image Source: Geek.com]
Now Ubisoft denies that this is a rootkit, writing, "The Uplay application has never included a rootkit."
Technically this appears to be correct in that the plugin was not
to be malicious, and has not yet been exploited in the wild.
That said consider the following:
The browser plugin is intended to launch game related software, but due to apparent coding error is allowed unrestricted executable access, meaning its advertised purpose does not match its capabilities.
This makes it, in effect, an accidental Trojan.
The plugin allows privileged access to the host machine.
The plugin runs in the background and is largely invisible.
The plugin accepts remote control signals to control the host machine.
Thus even if Ubisoft is correct -- that Uplay is not acting as a rootkit at present -- if the control channel were to be hijacked by a third party, it would become one. Channel hijacking would fulfill the sole missing criteria -- malicious behavior.
In other words, Ubisoft is arguing semantics, but based on a purely technical standpoint its plugin is very close to being capable of offering similar capabilities to a rootkit if hijacked by a malicious party. That, ostensibly, is where various media reports labelling the plugin as a "rootkit" arose.
Semantics aside, Ubisoft appears to realize this is a dangerous capability to leave lying around. It writes:
The issue was brought to our attention early Monday morning and we had a fix into our QC department an hour and a half later. An automatic patch was launched that fixes the browser plugin so that it will only open the Uplay application. Ubisoft takes security issues very seriously, and we will continue to monitor all reports of vulnerabilities within our software and take swift action to resolve such issues.
To update your Uplay client and apply the patch:
-Close any open web browsers (Internet Explorer, Firefox, Chrome, Opera, etc.) If the web browser is open during the patch it will require restarting the browser.
-Launch the Uplay PC client. The Uplay PC client update will start automatically.
-An updated version of the Uplay PC installer is also available to download from Uplay.com.
It remains to be seen if this is enough to wash Ubisoft's hands of
liability for allowing arbitrary code execution
on victim machines.
This article is over a month old, voting and posting comments is disabled
7/30/2012 5:18:07 PM
Sounds like buzzword media article. Ubi's intent was not malicious, it used the execution ability only for legit purposes (launching games), there is no malicious exploit in the wild for said execution code, and they released an update on their own which closed the hole.
If we call this a "rootkit", can we also say that Microsoft has installed rootkits on everyone's PC each time a new "flaw that allows a remote attacker to take control of the machine", is found? Because those kind of Windows security flaws are found nearly every month.
7/30/2012 6:54:14 PM
The road to hell is paved with good intentions.
7/30/2012 8:00:55 PM
Sure, in this case Ubi may not be malicious - they are incompetent.
In general, Ubi is malicious towards PC gamers so I didnt buy any of their game in last 3 years.
"Young lady, in this house we obey the laws of thermodynamics!" -- Homer Simpson
Ubisoft Caught Installing Exploitable DRM Plug-in on Users' Machines
July 30, 2012, 11:44 AM
The EFF Wants You to Know About Sony BMG Settlement
March 13, 2006, 2:17 AM
Cortana, Xbox App, OneDrive Apps/Settings Backup Added to Windows 10 Build
December 15, 2014, 3:43 PM
Quick Note: Windows Phone Finally Gets Candy Crush Saga
December 13, 2014, 2:03 PM
Next Windows 10 Test Build Likely to Land on Jan. 21, Press Event Announced
December 11, 2014, 5:49 PM
New FourSquare App Hits Windows Store, WinPhone Gets Official Minecraft App
December 10, 2014, 2:15 PM
RIP, Microsoft Clip Art (1993 to 2014), You'll be Missed (Sort of)
December 3, 2014, 3:54 PM
Quick Note: Monday is Last Day for Half Off (or More) Square Enix Games
December 1, 2014, 5:30 AM
Most Popular Articles
Miyamoto: Nintendo is Prepping Successor to Troubled Wii U
December 22, 2014, 6:28 PM
Amazon's Kindle Fire HDX 8.9 Drops to $299 (30 Percent Off) for a Day
December 22, 2014, 10:57 AM
Android-Powered BLU Studio 7.0 Claims to be the "World's Largest Smartphone"
December 19, 2014, 2:40 PM
Airbus A350 XWB Passenger Jet Takes Off, First Unit Delivered to Qatar Airlines
December 22, 2014, 1:22 PM
Mississippi AG Drops Anti-Google Subpoena After Dirty MPAA Ties Are Revealed
December 22, 2014, 9:51 AM
Latest Blog Posts
Sceptre Airs 27", 120 Hz. 1080p Monitor/HDTV w/ 5 ms Response Time for $220
Dec 3, 2014, 10:32 PM
Costco Gives Employees Thanksgiving Off; Wal-Mart Leads "Black Thursday" Charge
Oct 29, 2014, 9:57 PM
"Bear Selfies" Fad Could Turn Deadly, Warn Nevada Wildlife Officials
Oct 28, 2014, 12:00 PM
The Surface Mini That Was Never Released Gets "Hands On" Treatment
Sep 26, 2014, 8:22 AM
ISIS Imposes Ban on Teaching Evolution in Iraq
Sep 17, 2014, 5:22 PM
More Blog Posts
Copyright 2014 DailyTech LLC. -
Terms, Conditions & Privacy Information