XP security hole that even a 5 year old could exploit
Results 1 to 4 of 4

Thread: XP security hole that even a 5 year old could exploit

  1. #1
    Registered User
    Join Date
    Aug 2000
    Location
    Grand Rapids, MI, USA
    Posts
    813

    XP security hole that even a 5 year old could exploit

    I learned of this at another site and thought I would share it here. Turn down your volume if you play the animation at work. I imagine people are working overtime in Redmond right now to make a patch for this.

    http://isc.sans.org/diary.php?compare=1&storyid=1542

    XP local privilege escalation demonstrated (NEW)
    Changes between the current version and version 1 are highlighted.
    Published: 2006-08-03,
    Last Updated: 2006-08-03 12:59:40 UTC by Arrigo Triulzi (Version: 2)

    An excellent Flash animation showing the latest XP local privilege escalation has been published and it clearly demonstrates how trivial it is to "upgrade" from a user with administrative privileges to SYSTEM (the same but for unprivileged users is currently disputed, more at the CVE entry covering the issue and on the Bugtraq archives).

    How does it work?

    It is actually quite simple: normally a scheduler is used for running non-interactive programs unattended, for example anti-virus updates (in the "baddies" world it is used for scheduling netcat backdoors but this is hardly "normal usage").

    In this example the user decides to schedule running "cmd.exe" (the Windows command line prompt) rather than a non-interactive program. When the scheduler triggers it starts cmd.exe which opens a new command-line window.

    The problem is that the scheduler runs as the "SYSTEM" user which under Windows is an all-powerful user used for system tasks (the Windows equivalent of "root" under Unix) and, as this video demonstrate, it does not "drop privileges" (that is to say: "take on the privileges of the user requesting the scheduled job") before running the command.

    When the command is finally run at the specified time it therefore hands you a command line prompt with SYSTEM privileges.

    Is there a fix? Or indeed, why is this a problem? Well, the fix would be to stop the scheduler which breaks lots of other things (e.g. anti-virus updates) but which an adminstrator can easily restart... Now, is it really a problem since an administrator doesn't gain much? Well, it should not be the case that running a scheduled job lands you different privileges by default and, of course, should it turn out that administrative privileges are not needed then it becomes a far bigger issue as any user could gain SYSTEM privileges.

    Important note: do not watch this at work with your loudspeakers turned on (bad language disclaimer...). Headphones strongly recommended.
    "Tell me, and I'll forget. Show me, and I'll remember. Involve me, and I'll learn." -- Marla Jones

  2. #2
    Registered User Guts3d's Avatar
    Join Date
    Jan 2003
    Location
    Pittsburgh U.S.A.
    Posts
    2,328
    Thanks for posting this! Microsoft needs to look at this asap.
    " I don't like the idea of getting shot in the hand" -Blackie in "Rustlers Rhapsody"

    " It is a proud and lonely thing, to be a Stainless Steel Rat." - Slippery Jim DiGriz

  3. #3
    Registered User gemstone's Avatar
    Join Date
    Oct 2002
    Location
    Cheshire
    Posts
    155
    I never have scheduler running and it stops nothing else from functioning as it should.

  4. #4
    Registered User
    Join Date
    Sep 2000
    Posts
    218
    The problem is not that this is a bug - this is a documented feature that has been in NT for many years. Stupid design, yes - tantamount to leaving the keys in the car and the door unlocked - but properly documented and has been a documented way of getting system access for quite a while.

    I have been using it for a while to combat viruses and such - a lot of malware installs itself as SYSTEM and cannot be removed by software at administrator level (SYSTEM is greater than administrator).

    On the machines I administer, the users run as Limited Users (Users under 2000) and all abilities about running a scheduled service and so forth are reserved for the Administrator class (local policies, that sort of thing). This means that this trick does not work on a properly secured machine.

Similar Threads

  1. XP Security Center
    By OldBob in forum Windows XP
    Replies: 5
    Last Post: January 11th, 2005, 08:25 AM
  2. Latest IE Security Hole
    By silencio in forum Spyware & Antivirus - Security
    Replies: 0
    Last Post: November 27th, 2003, 07:16 PM
  3. Another Windows Security Hole
    By Diver01 in forum Spyware & Antivirus - Security
    Replies: 15
    Last Post: September 12th, 2003, 12:22 PM
  4. Security Hole Pt. 2
    By JungleMan1 in forum Comments and Suggestions
    Replies: 1
    Last Post: May 15th, 2001, 05:26 PM
  5. Scott has fixed the security hole
    By JungleMan1 in forum Comments and Suggestions
    Replies: 29
    Last Post: May 15th, 2001, 01:02 PM

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •