Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Hacker, Microsoft duke it out over Vista design flaw (UAC broken by design)
ZDNet ^ | 13 Feb 07 | Ryan Naraine

Posted on 02/13/2007 10:59:28 PM PST by Spktyr

Joanna Rutkowska has always been a big supporter of the Windows Vista security model. Until she stumbled upon a "very severe hole" in the design of UAC (User Account Control) and found out — from Microsoft officials — that the default no-admin setting isn't even a security mechanism anymore. Joanna Rutkowska

Rutkowska, a hacker with a track record of defeating Vista's security mechanisms, believes UAC has a major flaw in the way it automatically assumes that all setup programs (application installers) should be run with administrator privileges.

"[When] you try to run such a program, you get a UAC prompt and you have only two choices: either to agree to run this application as administrator or to disallow running it at all. That means that if you downloaded some freeware Tetris game, you will have to run its installer as administrator, giving it not only full access to all your file system and registry, but also allowing it to load kernel drivers! Why should a Tetris installer be allowed to load kernel drivers?," Rutkowska asked in a post on her Invisible Things blog.

That's because Vista uses a compatibility database and several heuristics to recognize installer executables and, every time the OS detects that an executable is a setup program, "it will only allow running it as administrator."

This, in Rutkowska's mind, is a "very severe hole in the design of UAC."

"After all, I would like to be offered a choice whether to fully trust given installer executable (and run it as full administrator) or just allow it to add a folder in C:Program Files and some keys under HKLMSoftware and do nothing more. I could do that under XP, but apparently I can’t under Vista, which is a bit disturbing," she added.

A few days after Rutkowska flagged the UAC shortcoming, Microsoft's Mark Russinovich wrote a detailed technical explanation of the way the mechanism works. One thing that stood out in Russinovich's explanation is an admission of sorts that the default configuration of UAC puts the user at risk of a sophisticated code execution attack.

Russinovich, a technical fellow at Redmond, writes:

As you experiment you’ll find that your actions are limited, but there are some design boundaries that you should be aware of. First, with the exception of processes and threads, the wall doesn’t block reads. That means that your low-IL command prompt or Protected Mode IE can read objects that your account (the standard-user version if you’re a member of the administrator’s group) can.

This potentially includes a user’s documents and registry keys. Even the ability of a process at low IL to manipulate objects of a higher IL isn’t necessarily prevented. Since processes running at different integrities are sharing the same desktop they share the same “session”. Each user logon results in a new session in which the processes of the user execute. The session also defines a local namespace through which the user’s processes can communicate via shared objects like synchronization objects and shared memory.

That means that a process with a low IL could create a shared memory object (called a section or memory-mapped file) that it knows a higher IL process will open, and store data in the memory that causes the elevated process to execute arbitrary code if the elevated process doesn’t properly validate the data.

That kind of escape, called a squatting attack, is sophisticated and requires the user to execute processes in a specific order and requires knowledge of the internal operation of an application that is susceptible to manipulation through shared objects.

Russinovich pegged it as a tradeoff between application compatibility and ease of use, explaining the weakness as a "design choice."

Because elevations and ILs don’t define a security boundary, potential avenues of attack , regardless of ease or scope, are not security bugs. So if you aren’t guaranteed that your elevated processes aren’t susceptible to compromise by those running at a lower IL, why did Windows Vista go to the trouble of introducing elevations and ILs? To get us to a world where everyone runs as standard user by default and all software is written with that assumption.

That explanation isn't sitting well with Rutkowska. In an e-mail interview, the Polish malware researcher said she was "pissed off" by what she perceived as Russinovich's flippant attitude to the potential risk.

"It seems like Microsoft realized that implementing UAC would be hard, so they decided not to call it a security mechanism anymore and that 'potential avenues of attack, regardless of ease or scope, are not security bugs'," she said, quoting directly from Russinovich's essay.

"I don't think it's fair after all this Vista security campaign we observed in 2006, where Microsoft was boasting about this new security model in Vista. This is not a proper way to solve security problems. Microsoft, instead of trying to diminish the problem, should work on the solutions (even if they expected to see a dozen of new attacks against UAC)," she added.

Rutkowska also took issue with this line from Russinovich's argument:

"[H]aving your elevated AAM processes run in the same account as your other processes gives you the convenience of allowing your elevated processes access to your account's code and data, but at the same time allows your non-elevated processes to modify that same code and data to potentially cause an elevated process to load arbitrary code…"

"This is not valid," Rutkowska declared. "If we followed this reasoning, then we would not be able to talk about security in our email clients nor web browsers, because they all also access data and code which are not trusted."

Her final thought: "I believe that the Vista security model is a good thing and that users can benefit from it, but Microsoft must change their attitude and start treating them as security mechanisms."

[UPDATE: February 13, 2007] Rutkowska wrote in to clarify a few things that appear confusing in the article above:

There are two different things, which should be distinguished:

1. The fact that UAC *design* assumes that every setup executable should be run elevated.

2. The fact that UAC *implementation* contains bugs, the one noted in the original blog entry that allows a low integrity level process to send WM_KEYDOWN messages to a command prompt window running at high integrity level.

I was “pissed off” not because of #1, I was “pissed off” because Microsoft employee — Mark Russinovich — declared that all *implementation* bugs in UAC are not to be considered as security bugs (see fact #2).

True, I also don’t like the fact that UAC forces users to run every setup program with elevated privileges (fact #1), but, I can understand such a design decision (as being a compromise between usability and security) and this was not the reason why I wrote my follow up titled “Vista Security Model - A Big Joke”.


TOPICS: Computers/Internet
KEYWORDS: defectivebydesgn; vista; whatsecurity
Navigation: use the links below to view more comments.
first 1-2021-4041-6061 next last
Slashdot commentary on this: http://it.slashdot.org/article.pl?sid=07/02/13/1922237

Looks like Microsoft made some elementary mistakes in planning their security model - and this means that Vista is about to get exploited as bad as XP was.

1 posted on 02/13/2007 10:59:34 PM PST by Spktyr
[ Post Reply | Private Reply | View Replies]

Most telling:

'"It seems like Microsoft realized that implementing UAC would be hard, so they decided not to call it a security mechanism anymore and that 'potential avenues of attack, regardless of ease or scope, are not security bugs'," she said, quoting directly from Russinovich's essay.

"I don't think it's fair after all this Vista security campaign we observed in 2006, where Microsoft was boasting about this new security model in Vista. This is not a proper way to solve security problems. Microsoft, instead of trying to diminish the problem, should work on the solutions (even if they expected to see a dozen of new attacks against UAC)," she added.'


2 posted on 02/13/2007 11:01:06 PM PST by Spktyr (Overwhelmingly superior firepower and the willingness to use it is the only proven peace solution.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Ping


3 posted on 02/13/2007 11:01:23 PM PST by Spktyr (Overwhelmingly superior firepower and the willingness to use it is the only proven peace solution.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Spktyr

I'm debating staying with XP due to the things I've heard about Vista needing so much computing power.


4 posted on 02/13/2007 11:11:27 PM PST by rdl6989
[ Post Reply | Private Reply | To 1 | View Replies]

To: rdl6989

I certainly would, because from what this lady is saying, Vista's about to become as exploited as XP is now anyway.

Of course, while I do have to be concerned about this for my PC-using clients, I don't have to worry about this at home. I use a Mac, and the worst that a Trojan could theoretically do is trash my user folder. It can't touch the core system.
The same goes for any properly configured Linux system.


5 posted on 02/13/2007 11:14:23 PM PST by Spktyr (Overwhelmingly superior firepower and the willingness to use it is the only proven peace solution.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Spktyr

Thanks for your advice. I am staying with XP for now.


6 posted on 02/13/2007 11:15:56 PM PST by rdl6989
[ Post Reply | Private Reply | To 5 | View Replies]

To: rdl6989

I bought my PC two years ago and I hope I get at least two more out of it so there's a chance Vista is usable on my new one.


7 posted on 02/13/2007 11:17:30 PM PST by Generic_Login_1787
[ Post Reply | Private Reply | To 4 | View Replies]

To: Spktyr; A. Pole; lizol; Lukasz; Grzegorz

Polish hacker chick!

Her blog

8 posted on 02/13/2007 11:37:57 PM PST by Bon mots (An Islamist wants to kill you. A Muslim merely wants you dead.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: rdl6989
I'm debating staying with XP due to the things I've heard about Vista needing so much computing power.

You will need 1 gig of RAM to get it running the way you want it. For the money you'll spend, your really just getting a cosmetic upgrade, nothing substancial that makes it worth $200. Personally I see Vista as the ME of XP. The reviews have been mediocre to down right savage. Honestly if you want to invest in another OS, experiment with Knoppix. You can download it and run it off a CD, so no worrys on installing it on your hard drive if you do not like it. And with Beryl graphics it will blow any and everything away that windows has ever offered Plus its Free!

9 posted on 02/13/2007 11:41:31 PM PST by Bommer (Global Warming: The only warming phenomena that occurs in the Summer and ends in the Winter!)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Bon mots

It's the blue pill girl. Be skeptical.


10 posted on 02/13/2007 11:43:38 PM PST by stainlessbanner
[ Post Reply | Private Reply | To 8 | View Replies]

To: Spktyr

How safe am I running XP with Firefox?


11 posted on 02/13/2007 11:46:03 PM PST by ROTB (Our Constitution...only for a [Christian] people...it is wholly inadequate for any other.-J.Q.Adams)
[ Post Reply | Private Reply | To 5 | View Replies]

To: ROTB

Safer than if you were running XP with IE 7, but if your computer is connected to the internet and it's running XP, chances are pretty good that you're going to get exploited anyway unless you *really* lock the thing down and install a hardware, not software firewall.


12 posted on 02/13/2007 11:50:17 PM PST by Spktyr (Overwhelmingly superior firepower and the willingness to use it is the only proven peace solution.)
[ Post Reply | Private Reply | To 11 | View Replies]

To: Bommer

For the newbie just getting into non-MS operating systems, and who doesn't want to take the Mac plunge just now, I'd recommend Linspire - it's a Linux-based Windows-workalike - in other words, the user interface is very much like Windows, so the novice can use it.


13 posted on 02/13/2007 11:52:38 PM PST by Spktyr (Overwhelmingly superior firepower and the willingness to use it is the only proven peace solution.)
[ Post Reply | Private Reply | To 9 | View Replies]

To: Spktyr

Thank you. I have ...

XP (unpatched)
Firefox
Firewall

No problems ... yet.


14 posted on 02/13/2007 11:54:24 PM PST by ROTB (Our Constitution...only for a [Christian] people...it is wholly inadequate for any other.-J.Q.Adams)
[ Post Reply | Private Reply | To 12 | View Replies]

To: Spktyr

security who needs it, certainly not Microsoft victims, so why not try a Linux OS like ubuntu available at http://www.ubuntu.com/
there is so much free ware and open source software ailble the need to tolerate microsoft's lack of concern for its customers is going to cost them big they are in my opinion their own worst enemy!


15 posted on 02/13/2007 11:55:07 PM PST by mtnjimmi (“When you choose the lesser of two evils, always remember that it is still an evil.” Max Lerner)
[ Post Reply | Private Reply | To 2 | View Replies]

To: ROTB

What do you mean by an "unpatched" XP?


16 posted on 02/13/2007 11:56:18 PM PST by Spktyr (Overwhelmingly superior firepower and the willingness to use it is the only proven peace solution.)
[ Post Reply | Private Reply | To 14 | View Replies]

To: Spktyr

I turned off the automatic updates. =)


17 posted on 02/14/2007 12:00:41 AM PST by ROTB (Our Constitution...only for a [Christian] people...it is wholly inadequate for any other.-J.Q.Adams)
[ Post Reply | Private Reply | To 16 | View Replies]

To: ROTB

Unpatched XP... are you insane?

You've been pwn3d and you don't even know it. Thanks for the spam.


18 posted on 02/14/2007 12:01:06 AM PST by MediaMole (9/11 - We have already forgotten.)
[ Post Reply | Private Reply | To 14 | View Replies]

To: ROTB

Congratulations, unless you've been updating your system through Windows Update weekly, you've been exploited and your computer has joined the legions of zombie machines on the internet.

You've been raped and you didn't even know it.


19 posted on 02/14/2007 12:03:04 AM PST by Spktyr (Overwhelmingly superior firepower and the willingness to use it is the only proven peace solution.)
[ Post Reply | Private Reply | To 17 | View Replies]

To: MediaMole

Yeah, he really is insane. Or he's running a pirated version of XP, and he's trying to get around the Windows Genuine Advantage BS. Either way, he's part of the problem children group on the internet, whether he wants to be or not.


20 posted on 02/14/2007 12:04:15 AM PST by Spktyr (Overwhelmingly superior firepower and the willingness to use it is the only proven peace solution.)
[ Post Reply | Private Reply | To 18 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-6061 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson