Is Limited User Account enough? Not really...

Discussion in 'other security issues & news' started by thanatos_theos, Mar 13, 2008.

Thread Status:
Not open for further replies.
  1. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    There is a program called SetSAFER that lets you use SRP in XP Home.
     
  2. Dogbiscuit

    Dogbiscuit Guest

    @tlu: When implementing LUA alone, privilege escalation exploits (especially the more common local type) are capable of breaking out of the limited account and compromising the OS, right?
     
  3. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    I'm not tlu, but I'll give my answer. The answer is yes. However, malware cannot do privilege escalation if it cannot run in the first place due to SRP, HIPS, etc. Posts #89 and 95 address privilege escalation.
     
  4. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    I believe that LUA and SRP properly configured might still be vulnerable to malware execution. Here is how:
    a) Assume that a buffer overflow exploit occurs and is not caught by DEP, etc.
    b) The buffer overflow shellcode downloads an executable file with a nonstandard extension such as .tmp in a nonstandard location. C:\index.tmp would be an example.
    c) The buffer overflow shellcode executes C:\index.tmp, and thus you have malware running, even with LUA and SRP, provided that SRP does not stop the execution of c:\index.tmp. I am not sure if SRP would block this or not. If SRP looks merely at extensions and not content, then I would guess SRP would not block this. (Technically, you already had malware running when the buffer overflow shellcode was running, but the shellcode usually just downloads executable code and runs it.)

    This is illustrated here.
     
  5. Dogbiscuit

    Dogbiscuit Guest

    Thanks for pointing out those posts as this has become a long thread.

    The point I was trying to bring up was that LUA alone can protect the OS (but not the limited account) if the user is generally careful. But not necessarily if the limited user is careless (or malicious).
     
    Last edited by a moderator: Jun 19, 2008
  6. soldataq

    soldataq Registered Member

    Joined:
    Jun 17, 2008
    Posts:
    2
    actually me thinks limited user can get you infected for limited user files only but i may be wrong.



    soldataq
     
  7. Cosmo 203

    Cosmo 203 Registered Member

    Joined:
    Mar 3, 2008
    Posts:
    165
    Small, but important correction (I set it bold here:)

    Limited users do not have the right to write files in the root of a volume, only folders.
     
  8. Cosmo 203

    Cosmo 203 Registered Member

    Joined:
    Mar 3, 2008
    Posts:
    165
    In principle you are correct, but more clearly you should say: only files, where the limited user has the writepermission, can get infected from a program (inclusive malware), that is executed with limited rights. That are; all files that have been created by this user or are stored inside the user's profile. So the system itself and all program files, that have been installed with admin rights are unchangeable by a limited user.
     
  9. Rmus

    Rmus Exploit Analyst

    Joined:
    Mar 16, 2005
    Posts:
    4,020
    Location:
    California
    I just confirmed this.

    copy-block2.gif
    _______________________________________________________-

    thanks,


    ----
    rich
     
    Last edited: Jun 17, 2008
  10. tlu

    tlu Guest

    @rich: You can create a folder in c:\ with limited rights, but if you can save/create a file in c:\ then your files/folders permissions are obviously corrupted. You should apply step2 in this post in order to restore the default permissions.
     
  11. Rmus

    Rmus Exploit Analyst

    Joined:
    Mar 16, 2005
    Posts:
    4,020
    Location:
    California
    Thanks, Thomas - I reset the permissions.

    I edited my post above to confirm this.


    ----
    rich
     
  12. Dogbiscuit

    Dogbiscuit Guest

    I've seen the admin account become compromised when running under LUA (w/out SRP) on an updated system (with default permissions, etc.). So it is not far-fetched.
     
    Last edited by a moderator: Jun 19, 2008
  13. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    Thanks for the correction Cosmo 203. How about if c:\other\index.tmp, for example, had been used instead?
     
    Last edited: Jun 17, 2008
  14. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    I don't want to duplicate information, so here's a relevant post I made in another thread about how malware can execute or do further damage in a system using LUA and SRP.
     
  15. SpikeyB

    SpikeyB Registered Member

    Joined:
    Mar 20, 2005
    Posts:
    479
    At work I am stuck with LUA. In order to run programmes of my choosing, I have created a folder off My Documents. In this folder I have a number of sub folders containing portable applications. I can also create shortcuts to these programmes in the startup folder of the menu system.

    If I can run "unwanted" programmes in a LUA, then I see no reason why malware cannot and so I conclude that LUA is not enough.

    If I was also saddled with the default rules for SRP then I would not be able to run my programmes.
     
  16. tlu

    tlu Guest

    See post #93.
     
  17. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
    Good Point!

    I see in addition to LUA for example thru the implimenting of the app SuRun coupled with hardening apps such as SAMURAI for one that one of it's features refuses to allow access to \Device\Physical Memory if i'm not mistaken but this is severe hardening or as i think Blue might put it another way, for a STATIC system in much the same way Deep Freeze and others would work.

    I know it's been mentioned that LUA should repel enough as to not make neccessary a HIPS, but if you want to absolutely assure your LUA is "Rock Solid" against user-mode and potential howbeit tiny entryway exploit potential, a very "Lite" HIPS like EQS can serve to LOCK DOWN completely and CONFIRM that your LUA remains untouchable.

    Again though, the purpose of LUA combined with SRP and some hardening should pretty much cover the spectrum relieving any need for HIPS, being a proponant of them i would test my LUA severely first to make sure no compromise is possible at all, and if it isn't, only then i would invite the services of a (once again) "Lite" HIPS to suppliment full containment.

    You can see by my enthusiasm over them how effective i found them to be, but the ideal! method would be to operate with LUA without HIPS at all, in which i'm highly in favor of myself in spite of my encouragement from them.

    More testing for me upcoming.

    EASTER
     
  18. Rmus

    Rmus Exploit Analyst

    Joined:
    Mar 16, 2005
    Posts:
    4,020
    Location:
    California
    For those just jumping into the thread at this point, you need to refer back to my posts #86 and #97 to get the context in which I tested an LUA: to see if it prevented the downloading/running of a program.

    The answer is no, as I successfully downloaded to the desktop and ran a self-contained program.

    My "misunderstanding" as tlu explained,

    Of course, I know that with Anti-Executable, the system is locked down completely so that no one but a person with the Password can install any executable - anywhere; but I was exploring what LUA alone provided. That's all.


    ----
    rich
     
  19. wordman

    wordman Registered Member

    Joined:
    Jun 22, 2008
    Posts:
    3
    I think LUA is mostly focused on protecting you against drive by attacks and against malicious apps that don´t need to be installed. But some of this can also be achieved on an admin account with DMR/SRP. Of course LUA is the better approach.
     
  20. Dogbiscuit

    Dogbiscuit Guest

    wordman, why did you copy this from post #54?
     
  21. SirMalware

    SirMalware Registered Member

    Joined:
    Jun 6, 2006
    Posts:
    133
    Recipe for MalwareFree Windows XP Pro

    INGREDIENTS:
    1 Windows XP Pro O/S w/updates
    1 Hardware Router/Firewall

    DIRECTIONS:
    1. Turn on PC and preheat computer to 75 degrees F.
    2. Add 1 cup Limited User Account.
    3. Add 1 cup Software Restriction Policy.
    5. Add 1/2 cup Designated File Types.
    4. Stir in 1/2 cup Additional Rules.
    5. Bake 3 hours in preheated, 450 degree F Broadband Internet.
    6. While baking, turn browser occasionally making sure many rogue servers are cooked evenly.
    7. After 3 hours, remove computer from broadband Internet and let cool.
    8. Open enclosed black bag and sprinkle fresh, raw, undetected malware into computer and bring to boil.
    9. Test freshly baked product by examining cooked O/S outside of the hard drive and look for any bitter malware infestations that would cause spoilage.

    Now sit back and enjoy this delicious, protected MalwareFree XP Pro meal. All natural juices are sealed in without the possibility of any bitter taste entering. Just think, you'll be the envy of friends and the enemy of malware writers with your new cooking skills preparing this delightful XP Pro dish. And remember, there's nothing to buy or clean up afterwards, it's free! And it's made with all natural ingredients and no artificial software preservatives!

    NOTE: In several taste tests, we found no need to add any extra antivirus or HIPS seasoning to this recipe as these didn't add any flavor or nutrition. We found the texture to be lighter and much smoother with a 'less is more' approach. Also, you can't add the Software Restriction Policy ingredient to the mix if you have Windows XP Home, Windows Vista Home Basic, or Windows Vista Home Premium. However, by adding 1 cup Limited User Account and 1 cup Fat-Free Third-Party HIPS to any of these, they will still taste delicious.
     
  22. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    I found a quote from a person here who modified permissions in XP to achieve this.
     
  23. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    Here are some Vista-specific quotes from the co-writer of a book on Vista security, taken from http://msinfluentials.com/blogs/jes...-about-vista-features-what-uac-really-is.aspx:

     
  24. Rmus

    Rmus Exploit Analyst

    Joined:
    Mar 16, 2005
    Posts:
    4,020
    Location:
    California
    Thanks for that link to the blog on Vista.

    This statement needs some clarification and amplification, for it depends on what you mean by "stop."

    The author seems to be investigating "stop" as this:

    But for many people, "stop" means preventing the malware from executing in the first place. This means that the security protection should alert to any attempt to do so.

    I use the term "unauthorized executable" rather than malware. I define that as

    Any executable not already installed on the computer.

    In this case, Vista's UAC does very well. I asked two people to test, and in every case, an attempt to install something brings up an alert similar to this, where the user inserted an installation CD which used the autorun.inf file to automatically run the setup file:


    UAC.png
    ____________________________________________________________________

    In another case, a similar alert displayed when a USB drive with an autorun.inf file attempted to automatically install an executable.

    This means that Vista's UAC will alert to the remote code execution exploits such as the drive-by download and the USB autorun.inf methods (Pendrive, digital picture frame) to install an executable.

    In this situation of "stopping malware," UAC performs very well. It's too bad that this point is not brought out in discussions of Vista's UAC.

    --
     
  25. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    I have found some research that shows a way that code running as a limited user in Vista can piggyback itself onto other programs that the user runs elevated. Microsoft was contacted, and responded that this is not considered a privilege escalation exploit and therefore will not be fixed.

    SRP with proper settings will prevent this from happening.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.