[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060813102626.2284.qmail@securityfocus.com>
Date: 13 Aug 2006 10:26:26 -0000
From: seppi@...pig.de
To: bugtraq@...urityfocus.com
Subject: Local privilege Escalation in SmartLine DeviceLock 5.73
The vulnerability constitutes of wrong ACLs on Device Object permission set by the driver.
Whenever your ACLs on a harddrive or partition, as configured by DeviceLock Manager, only consists of Allow entries (and Deny being the default), then the driver sets the ACLs on the kernel's internal object \Device\HarddiskX\PartitionY to Everyone:FullAccess, which allows complete read and write access to the raw file system, circumventing all access restrictions of NTFS. This behaviour can be easily verified by using Sysinternals' WinObj and dd.exe (dd if=\\.\C: | grep 'somesecretstuff') from GunWin32 or Win32-BinUtils (Cygwin should do the job as well) with a restricted user account.
In contrast, at least one explicit Deny entry leads to applying Everyone:DenyFullAccess, which effectively locks out even administrator users and the system, leading to certain problems with the Logical Volume Manager and some other system management utilities.
The vendor SmartLine has been informed about this vulnerability some weeks ago and verified it. However, they don't intend to release any patch, but rather refered to the upcoming version 6 of their software.
Workaround:
I didn't bother to check other objects for misplaced ACLs as well, but creating at least one explicit deny entry (as discussed above) should at least fix the vulnerability. It might also be possible to write a program that readjusts the ACLs on every reboot. Better uninstall this software at once.
Powered by blists - more mailing lists