-
August 3rd, 2006, 02:57 PM
#1
XP security hole that even a 5 year old could exploit
I learned of this at another site and thought I would share it here. Turn down your volume if you play the animation at work. I imagine people are working overtime in Redmond right now to make a patch for this.
http://isc.sans.org/diary.php?compare=1&storyid=1542
XP local privilege escalation demonstrated (NEW)
Changes between the current version and version 1 are highlighted.
Published: 2006-08-03,
Last Updated: 2006-08-03 12:59:40 UTC by Arrigo Triulzi (Version: 2)
An excellent Flash animation showing the latest XP local privilege escalation has been published and it clearly demonstrates how trivial it is to "upgrade" from a user with administrative privileges to SYSTEM (the same but for unprivileged users is currently disputed, more at the CVE entry covering the issue and on the Bugtraq archives).
How does it work?
It is actually quite simple: normally a scheduler is used for running non-interactive programs unattended, for example anti-virus updates (in the "baddies" world it is used for scheduling netcat backdoors but this is hardly "normal usage").
In this example the user decides to schedule running "cmd.exe" (the Windows command line prompt) rather than a non-interactive program. When the scheduler triggers it starts cmd.exe which opens a new command-line window.
The problem is that the scheduler runs as the "SYSTEM" user which under Windows is an all-powerful user used for system tasks (the Windows equivalent of "root" under Unix) and, as this video demonstrate, it does not "drop privileges" (that is to say: "take on the privileges of the user requesting the scheduled job") before running the command.
When the command is finally run at the specified time it therefore hands you a command line prompt with SYSTEM privileges.
Is there a fix? Or indeed, why is this a problem? Well, the fix would be to stop the scheduler which breaks lots of other things (e.g. anti-virus updates) but which an adminstrator can easily restart... Now, is it really a problem since an administrator doesn't gain much? Well, it should not be the case that running a scheduled job lands you different privileges by default and, of course, should it turn out that administrative privileges are not needed then it becomes a far bigger issue as any user could gain SYSTEM privileges.
Important note: do not watch this at work with your loudspeakers turned on (bad language disclaimer...). Headphones strongly recommended.
"Tell me, and I'll forget. Show me, and I'll remember. Involve me, and I'll learn." -- Marla Jones
-
August 4th, 2006, 07:10 AM
#2
Registered User
Thanks for posting this! Microsoft needs to look at this asap.
" I don't like the idea of getting shot in the hand" -Blackie in "Rustlers Rhapsody"
" It is a proud and lonely thing, to be a Stainless Steel Rat." - Slippery Jim DiGriz
-
August 4th, 2006, 01:41 PM
#3
Registered User
I never have scheduler running and it stops nothing else from functioning as it should.
-
August 7th, 2006, 12:32 PM
#4
The problem is not that this is a bug - this is a documented feature that has been in NT for many years. Stupid design, yes - tantamount to leaving the keys in the car and the door unlocked - but properly documented and has been a documented way of getting system access for quite a while.
I have been using it for a while to combat viruses and such - a lot of malware installs itself as SYSTEM and cannot be removed by software at administrator level (SYSTEM is greater than administrator).
On the machines I administer, the users run as Limited Users (Users under 2000) and all abilities about running a scheduled service and so forth are reserved for the Administrator class (local policies, that sort of thing). This means that this trick does not work on a properly secured machine.
Similar Threads
-
By OldBob in forum Windows XP
Replies: 5
Last Post: January 11th, 2005, 08:25 AM
-
By silencio in forum Spyware & Antivirus - Security
Replies: 0
Last Post: November 27th, 2003, 07:16 PM
-
By Diver01 in forum Spyware & Antivirus - Security
Replies: 15
Last Post: September 12th, 2003, 12:22 PM
-
By JungleMan1 in forum Comments and Suggestions
Replies: 1
Last Post: May 15th, 2001, 05:26 PM
-
By JungleMan1 in forum Comments and Suggestions
Replies: 29
Last Post: May 15th, 2001, 01:02 PM
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|
Bookmarks