Security software can reduce effectiveness of DEP/ASLR

Discussion in 'other security issues & news' started by MrBrian, Sep 5, 2011.

Thread Status:
Not open for further replies.
  1. Hungry Man

    Hungry Man Registered Member

    Joined:
    May 11, 2011
    Posts:
    9,146
    I'm considering removing Comodo and Mamutu actually. I need to figure some more things out =p
     
  2. 1chaoticadult

    1chaoticadult Registered Member

    Joined:
    Oct 28, 2010
    Posts:
    2,342
    Location:
    USA
    Ok then there is your answer.
     
  3. wat0114

    wat0114 Guest

    You're welcome. The results of the CIS scan are rather telling, although I have no idea, really, how easily exploitable the issues are. Most of the information presented isn't the easiest for me to interpret, although it's indisputable the issues are numerous, at least if the ASA program is accurately formulating its scan results.
     
  4. 1chaoticadult

    1chaoticadult Registered Member

    Joined:
    Oct 28, 2010
    Posts:
    2,342
    Location:
    USA
    Seriously thats alot of issues showing up. Not good at all.
     
  5. wat0114

    wat0114 Guest

    True, although I don't know how serious most of them are. If they're anything like the one sample kaspersky screenshot, it's a case of limited users having write access to certain directories created by the product in question. Still, this may be sloppy coding on the developer's part or it's actually necessary to allow write access for limited users for it to function properly?

    BTW, Kaspersky looks to have less than half that of CIS.
     

    Attached Files:

  6. 1chaoticadult

    1chaoticadult Registered Member

    Joined:
    Oct 28, 2010
    Posts:
    2,342
    Location:
    USA
    Wow. I might be rethinking my security setup once again. Applocker stays of course ;) Good thing I made some recent backups.
     
  7. dw426

    dw426 Registered Member

    Joined:
    Jan 3, 2007
    Posts:
    5,543
    I'll be very interested in what you come up with. I couldn't stand having both of those on my system, but you and I very likely don't think the same things about security, lol. Where we do agree is that an OS should be a lot more secure out of the box. Not many people can handle even some of the stuff we put on our systems, so they really need to be helped. That's usually why they stick to AV software and such, even now it's the mantra of every security 101 article in the media. It's all they know and it's all they're ever told.
     
  8. Hungry Man

    Hungry Man Registered Member

    Joined:
    May 11, 2011
    Posts:
    9,146
    Looking at cis alone is a terrible way to say it's insecure. Look at a bunch of others and I bet you'll see lists just as long.
     
  9. 1chaoticadult

    1chaoticadult Registered Member

    Joined:
    Oct 28, 2010
    Posts:
    2,342
    Location:
    USA
    Doesn't matter if one product has more lines than the other. wat showed that Kaspersky had half the lines of CIS and that is still too much. The point is that the security issues are there and can be used as places to attack. No one said CIS is not secure but if someone decided to exploit those security issues then CIS is breached as with any 3rd party security software with similar issues.
     
    Last edited: Sep 6, 2011
  10. Hungry Man

    Hungry Man Registered Member

    Joined:
    May 11, 2011
    Posts:
    9,146
    I know. I just want people to realize that this isn't Comodo-specific.

    I need to go through the report more carefully and see how big a deal some of these things are.

    Writing to a meaningless config file about Comodo's theme may not be a big deal. But you figure the reason you don't need UAC prompts every time you open Comodo is because users can change the config.

    Has anyone actually tried... you know... exploiting this stuff? Changing settings via these reg/files?
     
  11. 1chaoticadult

    1chaoticadult Registered Member

    Joined:
    Oct 28, 2010
    Posts:
    2,342
    Location:
    USA
    I did an scan for MBAM Pro w/ Realtime Protection just for fun. :D
     

    Attached Files:

  12. Hungry Man

    Hungry Man Registered Member

    Joined:
    May 11, 2011
    Posts:
    9,146
    Do something like Emsisoft AM. That should have tons.

    The simpler the program the less it will have. Comodo has multiple modules with tons of config settings.

    I'm still trying to figure out how to fix Comodo. I'm thinking I'll block access to the config files except for Admin and then run Comodo as Admin?

    IDK, gotta be a better way...
     
  13. 1chaoticadult

    1chaoticadult Registered Member

    Joined:
    Oct 28, 2010
    Posts:
    2,342
    Location:
    USA
    Of course. I just wanted to see the results of a scan on MBAM Pro.
     
  14. m00nbl00d

    m00nbl00d Registered Member

    Joined:
    Jan 4, 2009
    Posts:
    6,623
    Users have modification access to most of C:\ProgramData contents. I just checked MBAM free and it gives me modification access to C:\ProgramData\Malwarebytes\Malwarebytes' Anti-Malware.

    Checking permissions I can see Users have two permission sets. One allows Read and Execute only. Another one special permissions, which gives Write access to folders and sub-folders. To delete one needs Administrator privileges.

    It's not just restricted to security software, though. Some other applications files are free from being deleted, though. I never really tried delete the Write permissions and see what happens.
     
  15. wat0114

    wat0114 Guest

    You're right, and there are the common user directories where write access by at least the account member is possible as well.

    It would be interesting to see what happens after installing a security product, scanning for the issues, then removing the weak ACLs by removing write access to Everyone and Users. I wonder if it would break the functionality of the product or minimize the attack surface without breaking things? The latter scenario would obviously be ideal :)
     
  16. 1chaoticadult

    1chaoticadult Registered Member

    Joined:
    Oct 28, 2010
    Posts:
    2,342
    Location:
    USA
    While that would be nice and all, but wouldn't it just be easier to use built-in OS security and not be worry about what weak ACLs some 3rd party security software has. Just saying :D
     
  17. m00nbl00d

    m00nbl00d Registered Member

    Joined:
    Jan 4, 2009
    Posts:
    6,623
    It's not an issue with third-party security software or security software. It's software in general: download managers, etc.

    But, I don't think that having only Read and Execute permissions would cripple software. Following a bit of logic, C:\ProgramData will affect all user accounts, correct? If so, then only the administrator should be able to perform changes to those folders. Most applications (specially security applications) have a process/service already running that would allow them such permissions, anyway. All other apps, we would be requested to allow the actions.

    That said, I don't think we'd see that many alerts. After all, a process running already with administrator privileges/running as a service could do that in behalf of the program. This way, C:\ProgramData would be off limits to modification.

    Would it break anything? :doubt:

    Users should only be able to Write/Modify their own user profile and nothing else.
     
  18. 1chaoticadult

    1chaoticadult Registered Member

    Joined:
    Oct 28, 2010
    Posts:
    2,342
    Location:
    USA
    Well my main concern wasn't software in general but only 3rd party security software.
     
  19. wat0114

    wat0114 Guest

    True, I'm an advocate, as is probably quite obvious to many here, of using what's already built in to the O/S :) I was just speculating, although not really interested in trying it. m00nbl00d is probably right about the removal of write access not breaking anything.
     
  20. wat0114

    wat0114 Guest

    Sandboxie x64 was scanned. A few weak ACLs against the Trusted Installer but overall I'd say very impressive :)
     

    Attached Files:

  21. 1chaoticadult

    1chaoticadult Registered Member

    Joined:
    Oct 28, 2010
    Posts:
    2,342
    Location:
    USA
    Not bad.
     
  22. m00nbl00d

    m00nbl00d Registered Member

    Joined:
    Jan 4, 2009
    Posts:
    6,623
    The only weakness Sandboxie has is that it won't mimic file system permissions/restrictions and that settings should be per user account and not global.

    I would like for one user account not to be able to access the sandboxes of another user account. At the image of what happens in C:\Users\.... You cannot access other user profiles.

    I'd also like to be able to, for example, apply a medium integrity level to Temp folder inside a sandbox. I tried it, but it won't stick. It's just how Sandboxie works. :'(

    Besides these issues (issues for me, anyway), Sandboxie is a blessed application. :D
     
  23. xxJackxx

    xxJackxx Registered Member

    Joined:
    Oct 23, 2008
    Posts:
    8,645
    Location:
    USA
    Depends on how poorly written it was but I would suspect yes else this thread wouldn't exist.
     
  24. wat0114

    wat0114 Guest

    As requested, here's Emsisoft am :) ...
     

    Attached Files:

  25. 1chaoticadult

    1chaoticadult Registered Member

    Joined:
    Oct 28, 2010
    Posts:
    2,342
    Location:
    USA
    Hungry Man would like to see this one. I will check it out as well.. Thanks wat.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.