Circumventing SRP and AppLocker by design, with SANDBOX_INERT -> new process

Discussion in 'other security issues & news' started by Didier Stevens, Jan 24, 2011.

Thread Status:
Not open for further replies.
  1. RichieB2B

    RichieB2B Registered Member

  2. RichieB2B

    RichieB2B Registered Member

    I wrote it myself. It was very easy considering I didn't know much VB before I started today. Of course all the credit goes to Didier, I just put the pieces together. POC is at http://www.mountknowledge.nl/2011/0...-applocker-using-vb-script-in-word-and-excel/
     
    Last edited by a moderator: Jan 28, 2011
  3. trismegistos

    trismegistos Registered Member

  4. Lucy

    Lucy Registered Member

    Didier,

    Basically, can you confirm that a downloaded program using this "feature" (SANDBOX_INERT) will not be able to execute?

    It needs to be executed from inside an already existing and running process. And it can only run within the context of the user (standard or admin - let's not talk of priviledge excalation). I understand that it makes your "office" shellcodes easier but doesn't create a new field of exploits.

    Did I understand right?
     
  5. RichieB2B

    RichieB2B Registered Member

    @Lucy: for a downloaded program to bypass the AppLocker restrictions it needs to be started by an already whitelisted application using the SANDBOX_INERT flag. This could be Word or Excel using the VB code I published.
     
  6. katio

    katio Guest

  7. Didier Stevens

    Didier Stevens Security Researcher

    Correct.
     
  8. Lucy

    Lucy Registered Member

    Thank you for this short, yet concise answer.

    So I conclude that AppLoker, or srp? is a wonderful tool to stop drive-by downloads, is very efficient to enforce a company (or admin) IT policy.

    But it is very weak in doing its job when it comes to patrol documents which have script or program-like capabilities. It means that a company (or an admin) which would rely on this tool for security purposes would need as well to have a document policy to avoid untrusted / alien documents (office, PDF...) to be read, or at least that the supported script features should be inactivated or activated for only signed scripts whenever possible. This can be powerful but is certainly difficult to follow up.

    Anyway, this seems that such scenarri would be seen only in targetted attacks, instead of wide-spread contaminations.
     
  9. katio

    katio Guest

    No the VBA code is now available, any organisation having Office installed (practically everyone, except high secure systems) and using Applocker or SRP to enforce software policies needs to look into it. This is very serious.
    What's probably limited to targeted attacks is shellcode using these functions.
     
  10. Lucy

    Lucy Registered Member

    Right.

    I can't believe we will see much of it anyway, provided the huge number of people even in Wilders (supposedly security-aware) who run as admin their computers, while shutting down UAC for a so-called "ease of use".
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice