Is Limited User Account enough? Not really...

Discussion in 'other security issues & news' started by thanatos_theos, Mar 13, 2008.

Thread Status:
Not open for further replies.
  1. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    Hi MrBrian,

    I also read it a while ago, and it was funny to see that a bigtime security expert agreed with me, and also found this to be very odd! I mean how on earth can you give just any tool admin rights? That´s just silly. :)
     
  2. ParadigmShift

    ParadigmShift Registered Member

    Joined:
    Aug 7, 2008
    Posts:
    241
    Software Restriction Policy with added Designated File Types and Additional Rules

    Free, Easy, Simple, Secure, Stable, Lightweight and best of all, it works. :)
     
  3. ParadigmShift

    ParadigmShift Registered Member

    Joined:
    Aug 7, 2008
    Posts:
    241
    No install...
    No bugs...
    No crashes...
    No hooks...
    No fees...
    No English translation...
    No malware infiltration...

    Just a protected operating system and wonderful peace of mind.

    (Sung to the Sominex tune)
    Take SRP tonight and sleep...safe and restful, sleep, sleep, sleep.
     
  4. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
  5. ParadigmShift

    ParadigmShift Registered Member

    Joined:
    Aug 7, 2008
    Posts:
    241
    Although probably true, it's a hidden promo for a software product.
     
  6. Reimer

    Reimer Registered Member

    Joined:
    Apr 6, 2008
    Posts:
    217
    I was just wondering. I've read reports that malware such as Antivirus 2009 can be installed on LUA's.

    Does anyone know why and how? Would this be prevented if you close off the StartUp entries that aren't closed off by default?

    What about on Vista/7 on Standard user accounts?
     
  7. Lucy

    Lucy Registered Member

    Joined:
    Apr 25, 2006
    Posts:
    404
    Location:
    France
    To be able to install in a LUA, several things:
    -no need to access kernel but the drawback is that you can't take the power on the system, neither hide, nor record keystrokes from global hooks.
    -no need to access programs and windows folders as these ones can be modified only by administartors.
    -need to insert a value n one of the few startup registry keys dedicated to user.

    If you create a program which complies with these rules, then you can install it.

    With this kind of program, you can't damage the system, but you can spy, damage user folders and files (delete, ransom by encryption...) and survive a reboot.

    This applies to any windows version.

    Note that with SRP, it is not possible anymore. Antivirus 2009 or whatever setup will not even be able to run.
     
  8. Dogbiscuit

    Dogbiscuit Guest

    In 2008, 96 Microsoft vulnerabilities reported had a 'critical' rating, 8 of these 96 were identified as not being stopped by running as a limited or standard user (8%).

    Based on a quick examination of those 8:
    • 2 had no affect on Vista or XP (MS08-59, MS08-60).
    • 1 (by itself) could not compromise the OS if the user was running as a limited or standard user, but could allow the user account to become compromised (MS08-10).
    • 1 vulnerability was not critical under Vista, but could compromise the OS on XP, even running as LUA (MS08-67).
    • 2 others required Bluetooth or Excel, but could compromise the OS on both Vista and XP (MS08-30, MS08-43).
    • 2 other vulnerabilities could compromise both Vista and XP OSs, regardless of the type of account used (MS08-01, MS08-07).
     
    Last edited by a moderator: Mar 29, 2009
  9. Dogbiscuit

    Dogbiscuit Guest

    Of the above 8 Microsoft vulnerabilities, none were known to have been able to compromise fully patched Vista systems running as a standard user, since Microsoft reported that there was no evidence of any exploit code in existence for any of the bugs at the time.

    On XP, 1 bug of the above 8 could have been exploited to compromise even a fully patched system running under a limited user account ("This vulnerability is not dependant on the logged on user since it exploits a network service."). Exploit code for the bug had been used in "limited targeted attacks" (less than 100 organizations) "at least two weeks" before it was made public (it was learning of the exploit that disclosed the existence of the vulnerability). Using either a firewall or router would have stopped any known attacks, unless you were using only the Windows Firewall in it's default configuration (keeping File and Printer Sharing enabled would have left a system vulnerable to attack).

    Run as a standard or limited user, keep updated, use a well configured firewall/router.
     
    Last edited by a moderator: Apr 11, 2009
  10. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    From the paper 'Automatic Configuration Vulnerability Analysis' (PDF): (Feb. 2007)

     
  11. Windchild

    Windchild Registered Member

    Joined:
    Jun 16, 2009
    Posts:
    571
    Old paper, but has a good point. Limited users may not be so limited if you run software coded by people who don't understand security.

    And often those "commercial software from major vendors" are security products! To give a few examples, in the past, AVG, Avast and ZoneAlarm software has shipped with completely retarded file permission configurations (Everyone - Full Control on critical executables that are set to autostart with Windows with SYSTEM privs). All three had the kind of flaws that a trained monkey could detect in all of five seconds, using nothing more than Windows Explorer. Nice going, (in)security vendors. :D Fortunately, those three have since fixed the flaws I'm talking of here. And no doubt have made new flaws in the process.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.