Sony DRM

FYI...

- http://www.freedom-to-tinker.com/?p=928
"...You can tell whether you are vulnerable by visiting our CodeSupport detector page.
If the component is installed, you should try to remove it using the instructions from our earlier post. However, this may not be enough to prevent the software from being installed again, depending on your security settings. If you have been exposed, the safest thing to do is to avoid using Internet Explorer until you receive a fix from Sony and First4Internet. Firefox should be a safe alternative.
UPDATE (11/16, 2am): Sony has removed the initial uninstaller request form... In its place is the following message:
'November 15th, 2005 - We currently are working on a new tool to uninstall First4Internet XCP software. In the meantime, we have temporarily suspended distribution of the existing uninstall tool for this software. We encourage you to return to this site over the next few days. Thank you for your patience and understanding.'
This is a positive step that will help prevent additional users from being exposed to the flawed component, but customers who already used the web-based uninstaller remain at risk..."

:(
 
Last edited:
FYI the latest blog from Mark Russinovich: http://www.sysinternals.com/blog/2005/11/victory.html

Also FYI, I hope my Spybot friends find the following as disturbing as I do..... Regardless of all the bad publicity that the Sony case has generated, Sony is currently bragging (apparently for good reason) that their Santana CD (Arista, with XCP content) is "the #1 Artist Album today" (as of Nov. 9) on the Billboard charts and the #2 entry in the charts (next to the Now compilation). So much for hurting them in the pocketbook, apparently consumers do not care (or know). To add salt... a Neil Diamond CD (XCP also) is the #6 CD in Amazon regardless of the fact that there have been hundreds of reviews warning purchasers. Amazon is still selling these CDs regardless of the recall. If you want to upset your stomach read the Sony release on Santana under the news section of the SonyBMG web, http://www.sonybmg.com/ This is the same website that states that the CDs are recalled.... Gee :mad: :mad: :mad:
 
Last edited:
For those of you considering the Nancy McAleavey (Privacy Software) removal process mentioned above, please be aware that Russinovich recommends against unloading the Aries driver while Windows is running, quote: "I made the point in my last post that the type of cloaking performed by the Aries driver prohibits safely unloading the driver while Windows is running. It’s never safe to unload a driver that patches the system call table since some thread might be just about to execute the first instruction of a hooked function when the driver unloads; if that happens the thread will jump into invalid memory. There’s no way for a driver to protect against this occurrence..."
http://www.sysinternals.com/blog/2005/11/more-on-sony-dangerous-decloaking.html
 
Last edited:
el cpu:

For those who have installed the Sony XCP DRM software on their system what are your recommendations? You keep quoting that it is "never safe to unload a driver that patches the system call table", so how do you suggest that people go about removing the "Aries driver"?
 
md usa spybot fan:

In your post above you state that I "keep quoting that it is never safe to unload a driver..." FYI I have quoted that once. Regarding a suggestion to remove, I wish I had one but unfortunately no solution has yet been found safe, at least according to the discoverer himself. Please go back to my posting of November 15, 2005, at 16:25 >> "Mark Russinovich, the security researcher who first discovered the hidden Sony software, is advising users who played one of the CDs on their computer to wait for the companies to release a stand-alone uninstall program that doesn’t require filling out the online form". All I can suggest at this time is that users follow his advise and continue to check the Sysinternals site: http://www.sysinternals.com/

As one could perhaps discern from your own posting, the complete McAleavey solution is likely beyond the typical computer user. We have not heard much from the SB team on this, maybe they have a suggestion to share. Agent O put it well in his last post, I quote; "I hope Team Spybot can be proud to be the first to provide a complete solution".

:)
 
I've been keeping quiet on this subject since although Sony and First4Internet have badly handled the process, it's obviously heading in the right direction; maybe bouncing off walls would be a better description. :(

Anyway, I feel the following requires a simple sanity check:
el cpu said:
For those of you considering the Nancy McAleavey (Privacy Software) removal process mentioned above, please be aware that Russinovich recommends against unloading the Aries driver while Windows is running, quote: "I made the point in my last post that the type of cloaking performed by the Aries driver prohibits safely unloading the driver while Windows is running. It’s never safe to unload a driver that patches the system call table since some thread might be just about to execute the first instruction of a hooked function when the driver unloads; if that happens the thread will jump into invalid memory. There’s no way for a driver to protect against this occurrence..."
Though Mark Russinovich is undoubtedly correct about the proper method here and there is a potential risk, so what? What "thread might be just about to execute the first instruction of a hooked function when the driver unloads"? Most likely, this would be something related to the CD drive. Would you stick a CD in the drive while trying to remove software that uses it? What is the real likelyhood that such an event would occur under normal circumstances rather then under a test situation intended to show that it could occur? Though I don't know the answer myself, I doubt it's very probable.

Even if the situation did occur and the dreaded 'blue screen' happened, what would the result be? Since the blue screen is really a processor halt condition created by the detection of the thread jumping into invalid memory, this simply locks up the PC to protect it. Only software that was open at the time would be affected, so who leaves important programs open when performing an uninstall of any software, escpecially something like copy protection?

Though I understand and agree that both the software itself and the uninstallers to this point have potential problems, the only one that really concerns me is the ActiveX control used in the uninstall that appears to have an extremely bad vulnerability. Remember that the mass drive by the public is what is causing Sony to rush, which has helped create the current situation. Not defending Sony here, it's just always true that putting pressure on a bad technical situation will only make it worse. Sony's backout is no surprise to me, I knew it would happen the second I saw Mark's initial post, just not how quickly.

At this point it's also obvious that anti-malware developers will have to become involved in the cleanup effort. Since the original software had no automatic update facility (that I've heard of anyway) there's no way to inform those with the issue directly. It would be best, however, if this was a coordinated effort between the ASC/AV vendors and Sony. The fiasco to this point is due in large part to the lack of any coordination by anyone and the less then useful 'help' of the news media and general public, neither of which have a clue. Read some of the comments at Mark's site or even many of the Articles and Blogs referencing his site, they're rife with inaccuracies and just plain dumb statements.

My respect for Mark Russinovich as a programmer and helper within the anti-malware community in general is as solid as ever. However, my respect for his methods and handling of this situtaion are less then glowing. Posting this entire technical discussion directly in public without warning Sony and the anti-malware community first, giving them a chance to respond appropriately, was bound to create the mess that's ensued. It's made me question his motives more then once in the last few weeks. However, I'll give him the benefit of a doubt that he was concerned he might otherwise be stiffled by an injunction suit before he could go public.

Either way, I'd prefer to see this thing slow down before the compound mistakes get even worse. Unfortunately, there's new ugency created by the ActiveX control, so that may need immediate attention. At this point I've seen no effective direct threat from the original or patched versions of the software, only proof of concept. It would be best to leave this piece alone at least until someone has a removal tool that will deal with all variants; unpatched, patched, partially uninstalled and never really installed and not create more problems then exist already. This is and should be Sony's job and should only be taken over by others if they're ready for the same flack that Sony's gotten, since it will be their fault if it doesn't work, not Sony's.

Remember that the average person's tendancy is to just 'fix everything' and not research what's been found on their PC. So you better be sure your 'complete solution' will work before advertising it to the world or you'll end up linked with Sony in this debacle. So far I see no one coming up roses and the best profile has been to keep your head down in the crossfire.
 
FYI...

Welcome To Planet Sony
- http://www.doxpara.com/?q=sony
Submitted by Dan Kaminsky on Tue, 2005-11-15 09:28.
"Sony.
Sony has a rootkit.
The rootkit phones home.
Phoning home requires a DNS query.
DNS queries are cached.
Caches are externally testable (great paper, Luis!), provided you have a list of all the name servers out there.
It just so happens I have such a list, from the audits I've been running from http://deluvian.doxpara.com .
So what did I find?
Much, much more than I expected.
It now appears that at least 568,200 nameservers have witnessed DNS queries related to the rootkit. How many hosts does this correspond to? Only Sony (and First4Internet) knows... unsurprisingly, they are not particularly communicative. But at that scale, it doesn't take much to make this a multi-million host, worm-scale Incident..."

:(
 
bitman said:
Either way, I'd prefer to see this thing slow down before the compound mistakes get even worse. Unfortunately, there's new ugency created by the ActiveX control, so that may need immediate attention. At this point I've seen no effective direct threat from the original or patched versions of the software, only proof of concept. It would be best to leave this piece alone at least until someone has a removal tool that will deal with all variants; unpatched, patched, partially uninstalled and never really installed and not create more problems then exist already.
Well said bitman.
 
Hmmm...

- http://www.wired.com/news/print/0,1294,69601,00.html
Nov. 17, 2005
"... That all the big security companies, with over a year's lead time, would fail to notice or do anything about this Sony rootkit demonstrates incompetence at best, and lousy ethics at worst.
Microsoft I can understand. The company is a fan of invasive copy protection -- it's being built into the next version of Windows. Microsoft is trying to work with media companies like Sony, hoping Windows becomes the media-distribution channel of choice. And Microsoft is known for watching out for its business interests at the expense of those of its customers.
What happens when the creators of malware collude with the very companies we hire to protect us from that malware?
We users lose, that's what happens. A dangerous and damaging rootkit gets introduced into the wild, and half a million computers get infected before anyone does anything.
Who are the security companies really working for? It's unlikely that this Sony rootkit is the only example of a media company using this technology. Which security company has engineers looking for the others who might be doing it? And what will they do if they find one? What will they do the next time some multinational company decides that owning your computers is a good idea?..."

:(
 
FYI, from the Microsoft Anti-Malware team:
"Detection and removal will also be added to the December release of the Malicious Software Removal Tool which will be released the second Tuesday of December. We also wanted to take a moment to confirm that we are not removing or disabling Sony’s XCP software. We are only removing the rootkit component published by First 4 Internet which is included as part of Sony’s XCP software. We will continue to monitor the situation and react as conditions change. There has also been quite a bit of discussion on the web around the ActiveX control that was later released by First 4 Internet and Sony to neutralize the rootkit. The ActiveX control has been cited with a variety of issues / vulnerabilities and it was quickly pulled off of the Sony site. If you have concerns with this ActiveX control it can be blocked by following the directions at the MSRC blog." http://blogs.technet.com/antimalware/archive/2005/11/17.aspx

It also apppears that one of the other Copy Protection schemes that SonyBMG uses, SunnComm DRM, has big problems also. See the post: "Not Again! Uninstaller for Other Sony DRM Also Opens Huge Security Hole" at: http://www.freedom-to-tinker.com/
 
Last edited:
I'm inclined to agree with CA's list of reasons for detecting XCP:

Installs without user permission, presenting only a vague and misleading EULA
Changes system configuration without user permission at time of change.
Defends against removal of, or changes to, its components
Silently modifies other programs' information or website content as displayed.
Includes mechanisms to thwart removal by security or anti-spyware products.
Cannot be uninstalled by Windows Add/Remove Programs and no uninstaller is provided with application.

Perhaps Spybot needs a separate category of "rootkit" for software that hides files or processes from the administrator of the computer, even if the software doesn't do anything else malicious. I'm inclined to believe that most people don't want rootkits on their computers, regardless of who put them there and why.
 
zak.wilson said:
I'm inclined to agree with CA's list of reasons for detecting XCP:

Installs without user permission, presenting only a vague and misleading EULA
Changes system configuration without user permission at time of change.
Defends against removal of, or changes to, its components
Silently modifies other programs' information or website content as displayed.
Includes mechanisms to thwart removal by security or anti-spyware products.
Cannot be uninstalled by Windows Add/Remove Programs and no uninstaller is provided with application.

Perhaps Spybot needs a separate category of "rootkit" for software that hides files or processes from the administrator of the computer, even if the software doesn't do anything else malicious. I'm inclined to believe that most people don't want rootkits on their computers, regardless of who put them there and why.

I completely agree...ITS TIME!!!

I will need to be able to recommend an effective tool to protect users, for my family, friends, coworkers and customers...will Spybot be up to the task, or bow to corporate poison?

Right now CA's PestPatrol seems to be the only product I can recommend for effective spyware protection..unless Spbot steps up to the plate and blocks not only the rootkit but XCP entirely.

Personally, I don't want a single shred of DRM installed on my machines for any reason. If something I want to watch or listen to is DRM'd, I don't need it!
 
Suicide by Root Kit removal

At this point I'm less inclined then ever to suggest that any anti-malware product attempt this removal, since Sony now displays the following on their page regarding uninstalls:
November 15th, 2005 - We currently are working on a new tool to uninstall First4Internet XCP software. In the meantime, we have temporarily suspended distribution of the existing uninstall tool for this software. We encourage you to return to this site over the next few days. Thank you for your patience and understanding.
http://cp.sonybmg.com/xcp/english/form14.html

Only if this new uninstaller doesn't become available in a reasonable time frame (a couple weeks for development and testing) and/or doesn't truly remove the software completely and safely at that point should this be considered.

Until then, only removal of the hidden attribute of the 'Root Kit' technology and blocking of the problematic ActiveX control used with the earlier uninstaller should be considered. In fact, I feel that removing the hidden attribute is itself dangerous, since some users may then attempt to delete the files manually, which is known to be dangerous to the stability of the PC.

In addition, this cooling off period gives Team Spybot time to thoroughly test the detection and removal process on multiple platforms for all variants of the software currently known to exist, if they are indeed working on such a thing at all. If such removal is attempted, the potential for failure and damage to a PC is the responsibility of those removing it, not Sony.

By declaring this DRM package 'malware' some will feel they are justified to remove it, safely or not. Those who do this and fail will find out how quickly the public can turn on them since the last thing the user did was 'scan and fix' with their program, they won't care what was being removed or what disclaimers the software contains about such possibile damage.
 
I completely understand not removing it at this point, but I'd like to see it added to the immunization database to prevent installation in the future.

I'd be inclined to wipe my hard drive and reinstall my system to get rid of it.
 
Last edited:
Hello.
Regarding Spybot-S&D detections, team is aware of and looking into the subject matter.
 
bitman said:
In addition, this cooling off period gives Team Spybot time to thoroughly test the detection and removal process on multiple platforms for all variants of the software currently known to exist, if they are indeed working on such a thing at all. If such removal is attempted, the potential for failure and damage to a PC is the responsibility of those removing it, not Sony.

By declaring this DRM package 'malware' some will feel they are justified to remove it, safely or not. Those who do this and fail will find out how quickly the public can turn on them since the last thing the user did was 'scan and fix' with their program, they won't care what was being removed or what disclaimers the software contains about such possibile damage.
I agree with you that any potentially dangerous removal routine should be tested before being released to the general public. If the Spybot team needs to take its time to make sure the removal works properly, they should do so. My point is simply that rootkits are malware, regardless of who's using them or why.

As for XCP itself, my understanding of the software is that it interferes with the way the OS normally accesses the CD drive, and it sends information to Sony without telling the user. The EULA might say they can do it, but most peolpe don't accept that excuse from Gator/Claria; why should we accept it from Sony?
 
Bitman:

I have followed your posts on this thread with interest as your opinions have differed from those of the anti-malware community. Bear with me please, :)... I quote:

Nov 1: Mark's article is an opinion, not an indication of any illegal activity [by Sony]
Nov 1: Though Mark doesn't like the way they implement that protection for technical reasons, they [Sony] are totally within their rights
Nov 1: I'd rather not see any reputable antispyware organization take the position of removing such software… All that will do is…. tie up resources that would be better spent fighting 'true' malware
Nov 3: Though it's badly written and may create a potential hiding place for true malware, nothing described has made this program itself malware
Nov 17: At this point it's also obvious that anti-malware developers will have to become involved in the cleanup effort
Nov 21: At this point I'm less inclined then [sic] ever to suggest that any anti-malware product attempt this removal, since Sony now displays...

All of us are entitled to our opinions of course, but personally I am glad to see Tashi’s post above. The Sony rootkit has been classified as malware by nearly all AntiVirus/AntiMalware companies and most have added it to their detections already; Computer Associates, Symantec, McAfee, and Microsoft AntiSpyware, to name a few. Your last post is entitled "Suicide by Root Kit removal"... are all those companies wrong? Relying exclusively on a Sony uninstaller for the complete XCP might work for those that know they are infected but will do nothing for those that do not - isn't that what anti-malware programs are about, to detect and warn about existing malware that the user may not be aware of? Agent O said it well in a previous post, quote: “Contrary to bitman's position above, I am personally of the opinion that Sony should not be held to a lower ethical standard merely because they are big. I think this should be added to the [Spybot] definitions. Covert malware like this is unacceptable, no matter who makes or distributes it; and I would hope that any reputable antispyware solution would also feel the same way.”

p.s. to all readers, Nancy McAleavey has a new post on her site http://www.dozleng.com/updates/topic7048 that addresses the concerns I mentioned in an earlier post… Russinovich’s concerns, not mine, although I am the one that quoted them. Nancy has addressed them well. Also fyi "The Electronic Frontier Foundation filed a class-action lawsuit against SonyBMG on Monday. It's the second legal challenge to SonyBMG in one day. The attorney general for Texas also filed a suit against the music giant for allegedly violating the Consumer Protection Against Computer Spyware Act of 2005."
 
Last edited:
el cpu said:
The Sony rootkit has been classified as malware by nearly all AntiVirus/AntiMalware companies and most have added it to their detections already; Computer Associates, Symantec, McAfee, and Microsoft AntiSpyware, to name a few. Your last post is entitled "Suicide by Root Kit removal"... are all those companies wrong? Relying exclusively on a Sony uninstaller for the complete XCP might work for those that know they are infected but will do nothing for those that do not - isn't that what anti-malware programs are about, to detect and warn about existing malware that the user may not be aware of?
Symantec detects it as a security risk, not as malware. They provide a removal tool, but recommend that you use Sony's instead. Microsoft detects and removes the cloaking, but not XCP itself. McAfee removes the cloaking, but not the copy protection. CA detects all varients of XCP as trojans, but their website doesn't make it clear if it is properly removed or not. They also classify the included music player program as spyware because it phones home without telling the user.

Of these, I think CA's attitude is the most appropriate. I suspect they don't provide a fully functional uninstaller because they haven't properly tested it yet, not because they don't want to. Symantec and McAfee appear to believe XCP is legitimate, but a potential security risk. Microsoft condems the rootkit functionality, but seems ok with the rest of it. Only CA condems the whole package.
 
el cpu said:
Bitman:
Your last post is entitled "Suicide by Root Kit removal"... are all those companies wrong?
I believe bitman was considering that in the rush to find a fix there was the potential to cause even more damage.
 
Back
Top