Memory Protection

Discussion in 'ProcessGuard' started by KoreanBoy, Oct 3, 2004.

Thread Status:
Not open for further replies.
  1. Paranoid2000

    Paranoid2000 Registered Member

    Joined:
    May 2, 2004
    Posts:
    2,839
    Location:
    North West, United Kingdom
    So by this reasoning, would it not follow that if someone allows csrss, lsass, svchost and ntvdm Physical Memory access (PG's default rules) then they don't want to be protected either? ;) Since svchost can be called upon to do a whole host of tricks by other programs including malware, its inclusion is the most potentially troublesome in my view. While I would certainly agree that PG cannot (and should not) seek to overrule "bad" configuration decisions, the user should not be left completely in the dark should PG be disabled somehow - a periodic check on PG's hooks surely should not be too difficult to implement and can provide a further opportunity to alert users to possible malware on their systems.
    Going OT a little, I suspect that DEP will offer far less than complete protection since it does require well-behaved programs that only mark the memory they need - one careless process marking too much would greatly weaken the protection DEP can offer. However it is an extra layer of defence that may help in some situations. Anandtech have a thoughtful article on this - A bit about the NX bit; Virus Protection Woes covering other problems with DEP.
     
  2. Alec

    Alec Registered Member

    Joined:
    Jun 8, 2004
    Posts:
    480
    Location:
    Dallas, TX
    Ok, I guess I'm one of those that you can consider slightly confused. I understand what you did write, but I'm left a little confused about what seems unsaid. As I understand it, a process has to have an Administrator security context to be able to read \\Device\PhysicalMemory, and an even more 'specialized' context to write to it. My question is this, if some piece of malware is running with a security context sufficient to read/write to \\Device\PhysicalMemory, wouldn't it also have sufficient privileges to install a kernel-mode driver that could accomplish the same thing anyway? I mean, all of this seems somewhat contradictory and self-defeating to me. You say PG protects \\Device\PhysicalMemory and that "there is NO way for malware to get around the protection"; yet, you also make the followup statement that "kernel mode code can do anything it wants, period". Isn't the real solution to make sure that you work 99.9% of the time in a non-Administrator account, and be extremely careful about any software that executes and installs while you are running with Admin privileges?
     
  3. gkweb

    gkweb Expert Firewall Tester

    Joined:
    Aug 29, 2003
    Posts:
    1,932
    Location:
    FRANCE, Rouen (76)
    Hi,

    that's because PG has also a "driver protection" option, which block any process to install such kernel driver, untill you allow it to.

    regards,

    gkweb.
     
  4. Jason_DiamondCS

    Jason_DiamondCS Former DCS Moderator

    Joined:
    Nov 11, 2002
    Posts:
    1,046
    Location:
    Perth, Western Australia
    As far as I am aware in regards to the physical memory access, you cannot "trick" svchost or any of those other executables into getting access to physical memory. If there is some "vulnerability" or "feature" in Windows which is found out to allow this ProcessGuard will block it in future builds.

    In the meantime if you are paranoid and think svchost.exe is vulnerable to some unknown exploit then remove physical memory access from it, it shouldn't crash your computer. :)
     
  5. Paranoid2000

    Paranoid2000 Registered Member

    Joined:
    May 2, 2004
    Posts:
    2,839
    Location:
    North West, United Kingdom
    Done. :) (who me? Paranoid? :D). However is there a reason for having this permission set as a default for svchost?
     
  6. Pilli

    Pilli Registered Member

    Joined:
    Feb 13, 2002
    Posts:
    6,217
    Location:
    Hampshire UK
    Hi Paranoid2000, I have disabled svchosts.exe with Allow physical memory & services.exe with Install drivers/services all of today. Run everything I normally use, burnt a CD, updated SpySweeper to V3.2 which included a restart and have had no problems as yet.
    I believe that disabling Install driveres/services for services.exe can cause problems for AOL users and probably some others. :)

    Pilli
     
  7. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Hi everyone

    You are right about services.exe with AOL and probably some other software. I just don't think it is an issue anymore. Before Jason modified PG clearly with services.exe not having install driver/services privileges it obviously could still do what it needed to for the operating system. But if an external program such as AOL or a nasty tried to install a service, it couldn't without services.exe having appropriate privilieges. Once service.exe was given the privilege to install, than anything could use it. That was a problem.

    Now with services.exe having install privileges, AOL is still blocked until I give aolacsd.exe install drivers/services privileges. So even though services.exe now has privileges, nothing can install thru services unless it is also given privileges. Hence for a nasty to install something you have to give it permission. Neat.
     
  8. Paranoid2000

    Paranoid2000 Registered Member

    Joined:
    May 2, 2004
    Posts:
    2,839
    Location:
    North West, United Kingdom
    I always find it ironic that an ISP targetting new users has such a pig-awkward, resource-guzzling monster of an application that has to be run for access, which adds so many complications like with firewall configuration (especially for trying to get an "all ports stealthed" result with AOL's TopSpeed software running).

    I've left drivers/services off with svchost/services for a while now (although, like yourself, I have noticed some applications need it to install and some to run). The physical memory issue though looks to be another matter since blocking the wrong processes would probably have a far more serious affect.

    Peter2150,

    Do you have access to a later (unreleased) PG beta with this services fix? (Edit: Never mind, just checked your sig...)
     
  9. Pilli

    Pilli Registered Member

    Joined:
    Feb 13, 2002
    Posts:
    6,217
    Location:
    Hampshire UK
    :D Very neat, I wonder if that is also applied to other system processes like SMSS.exe?
    I do recall peter, that you had quite a session with Jason on those issues but did not recall the fix. So thanks for reminding me. :)

    P2K - There have been many modifications in the private betas since the last Public Beta. I am sure Jason will list them for the final release.

    Cheers. Pilli
     
  10. zazani_ozi

    zazani_ozi Guest

    please send me your articles.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.