* This commit effectively fixes https://www.kb.cert.org/vuls/id/403768 (CVE-2017-13083) as it is described per its revision 11, which is the latest revision at the time of this commit, by disabling Windows prompts, enacted during signature validation, that allow the user to bypass the intended signature verification checks. * It needs to be pointed out that the vulnerability ("allow(ing) the use of a self-signed certificate"), which relies on the end-user actively ignoring a Windows prompt that tells them that the update failed the signature validation whilst also advising against running it, is being fully addressed, even as the update protocol remains HTTP. * It also need to be pointed out that the extended delay (48 hours) between the time the vulnerability was reported and the moment it is fixed in our codebase has to do with the fact that the reporter chose to deviate from standard security practices by not disclosing the details of the vulnerability with us, be it publicly or privately, before creating the cert.org report. The only advance notification we received was a generic note about the use of HTTP vs HTTPS, which, as have established, is not immediately relevant to addressing the reported vulnerability. * Closes #1009 * Note: The other vulnerability scenario described towards the end of #1009, which doesn't have to do with the "lack of CA checking", will be addressed separately. |
||
---|---|---|
.github | ||
res | ||
src | ||
.amend.cmd | ||
.gitattributes | ||
.gitignore | ||
_chver.sh | ||
_coverity.cmd | ||
_post-commit.sh | ||
_pre-commit.sh | ||
_release.sh | ||
_set_git_hooks.sh | ||
_sign.cmd | ||
aclocal.m4 | ||
appveyor.yml | ||
bootstrap.sh | ||
ChangeLog.txt | ||
compile | ||
configure | ||
configure.ac | ||
install-sh | ||
LICENSE.txt | ||
Makefile.am | ||
Makefile.in | ||
missing | ||
README.md | ||
rufus (Clang).sln | ||
rufus.sln |
Rufus: The Reliable USB Formatting Utility
Features
- Format USB, flash card and virtual drives to FAT/FAT32/NTFS/UDF/exFAT/ReFS
- Create DOS bootable USB drives, using FreeDOS or MS-DOS (Windows 8.1 or earlier)
- Create BIOS or UEFI bootable drives, including UEFI bootable NTFS
- Create bootable drives from bootable ISOs (Windows, Linux, etc.)
- Create bootable drives from bootable disk images, including compressed ones
- Create Windows To Go drives
- Compute MD5, SHA-1 and SHA-256 checksums of the selected image
- Twice as fast as Microsoft's USB/DVD tool or UNetbootin, on ISO -> USB creation (1)
- Perform bad blocks checks, including detection of "fake" flash drives
- Modern and familiar UI, with 39 languages natively supported
- Small footprint. No installation required.
- Portable
- 100% Free Software (GPL v3)
Compilation
Use either Visual Studio (2017 or later) or MinGW and then invoke the .sln
or configure
/make
respectively.
Visual Studio
Note that, since Rufus is an OSI compliant Open Source project, you are entitled to download and use the freely available Visual Studio Community Edition to build, run or develop for Rufus. As per the Visual Studio Community Edition license this applies regardless of whether you are an individual or a corporate user.
Additional information
Rufus provides extensive information about what it is doing, either through its easily accessible log, or through the Windows debug facility.
Enhancements/Bugs
Please use the GitHub issue tracker for reporting problems or suggesting new features.
(1) Tests carried out with a 16 GB USB 3.0 ADATA pen drive on a Core 2 duo/4 GB RAM platform running Windows 7 x64.
ISO: en_windows_7_ultimate_with_sp1_x64_dvd_618240.iso
Name of tool | Version | Time |
---|---|---|
Windows USB/DVD Download Tool | v1.0.30 | 8 mins 10s |
UNetbootin | v1.1.1.1 | 6 mins 20s |
Rufus | v1.1.0 | 3 mins 25s |