








Windows UAC Bypass Permits Code Execution (threatpost.com) 79
msm1267 writes from a report via Threatpost: A Windows UAC bypass has been publicly disclosed that not only bypasses the security feature meant to prevent unauthorized installs, but can be used to run code on compromised machines without leaving a trace on the hard disk. The bypass relies on Event Viewer (eventvwr.exe), a native Windows feature used to view event logs locally or remotely. Researcher Matt Nelson said he figured out a way to use eventvwr to hijack a registry process, start Powershell and execute commands on Windows machines; he collaborated with fellow researcher Matt Graeber on a proof-of-concept exploit, which was tested against Windows 7 and 10. A report published today by Nelson said it would work against any version of the OS that implements UAC. An attacker would already need to be on the machine to use this technique, Nelson said. The attack allows an admin user to execute code in a high-integrity context without requiring the user to approve the administrative action via the UAC pop-up. Microsoft, the researcher said, does not consider UAC bypasses a security boundary worthy of a bulletin and patch. It's unclear how Microsoft will address this issue.
Well duh (Score:3)
Easier to just rely on the luser to click "Allow" when the UAC prompt pops up.
Re: (Score:2)
Doesn't elevation in Linux just use sudo?
If so, all you need to do is visudo and add the NOPASSWD flag to the appropriate match rule.
Re: (Score:2)
Re: (Score:1)
Re: (Score:1)
The sky is blue, water is still wet, and windows is still insecure.
The sky is blue, water is still wet, and windows is still INTENTIONALLY insecure.
ftfy.
It has nothing to do with third party software makers as you put it. It is US government spying apparatus. So are Google and Facebook and Twitter and Cloudflare (yeah, those captchas), and Markmonitor and way more. (Slashdot is just HUMINT which is normally out of FBI area of expertise... they are SIGINT. This is why they look so stupid here.)
The US Gov forced Microsoft into spy servitude way back when they threatene
Re:In other news... (Score:5, Interesting)
Re: (Score:2)
Re: (Score:2)
That is called Do you want to be spied on today.dll
I especially like the spaces in the file name. It really makes you feel on Windows.
Am I reading this right? (Score:5, Informative)
An attacker would already need to be on the machine to use this technique, Nelson said. The attack allows an admin user to execute code in a high-integrity context without requiring the user to approve the administrative action
So the attacker already pwns the machine. This is a threat?
Re: (Score:1)
STFU. We're trying to blow shit out of proportion here!
Re: (Score:2)
All this exploit does is remove the "are you sure?" prompt that is displayed when a user that is ALREADY an administrator tries to do something in a high integrity context.
He is an idiot for pointing that out?
If it was just a standard user, this exploit would not work.
Also, this is not remotely exploitable... so, yeah, if you are already and administrator and have local access to the machine.... well, you can do whatever you want even without the exploit.
As a Windows admin, I find UAC to be useful, because
Not quite right, but it's stupid anyhow. (Score:2, Interesting)
Elevation from limited-user access to "root" (Administrators-level access) is definitely a threat. Of course, in this case, it's just enabled by a really moronic default that Microsoft added to UAC in Win7 (and has persisted since), which auto-elevates some "trusted" Windows binaries (like eventvwr.exe). If you remove that particular stupidity (in the UAC control panel, move the slider all the way up to "Always Notify"), this attack (and the long, long list of similar things, many known for years, like it)
Re: (Score:2)
Elevation from limited-user access to "root" (Administrators-level access) is definitely a threat.
This doesn't do that. You have to already be already running as an Administrator for this so-called exploit to work. If you are not in the Local Administrators group then you will get the prompt requiring a password.
Re: (Score:2)
Elevation from limited-user access to "root" (Administrators-level access) is definitely a threat.
Of course it is, but if you actually read the article - or even the summary - you will see that that is not what is happening here:
An attacker would already need to be on the machine to use this technique, Nelson said. The attack allows an admin user to execute code
So without this technique the only difference would be that the attacker would have to click 'Allow' in the UAC prompt.
You new here, or just completely ignorant? (Score:2)
OK, 7-digit ID or not, are you really so new here you think that Slashdot summaries (or even articles) are an always-accurate representation of the world? Out here in the real world, where I've been working in information security longer than you've been on this site (and nearly as long as I have, actually), we understand the difference between "the attacker needs to physically or remotely accessing the machine" and "the attacker needs to have code executing on the machine". It's a very important difference
Re: (Score:2)
OK, 7-digit ID or not, are you really so new here you think that Slashdot summaries (or even articles) are an always-accurate representation of the world? Out here in the real world, where I've been working in information security longer than you've been on this site
Yes ok your life revolves significantly around this site, I get that but not everybody's does.
The fact that the summary implies direct access is required is stupid, but the fact that you (and, apparently, a significant number of other people) took that implication as fact says much more about you all than it does about the exploit.
I don't think I said or implied "direct access". I quoted "on the machine" which could be remote, it could be by proxy.
Try reading the actual exploit writeup [enigma0x3.net] rather than dumbed-down ThreatPost article, and you'll see that no such claim is made.
So the claim I didn't make is also not made by Threatpost, well glad we cleared that up.
Hell, even in the ThreatPost article, it doesn't say (or even imply) anything about physical access.
Neither did I.
You can do this exploit if you get non-elevated arbitrary code execution (via remote compromise, or Trojan download, or anything else of that sort) in the account of a member of the Administrators group. You cannot click "Allow" via non-elevated code execution
If you have already achieved that you don't really need this exploit.
Re: (Score:2)
So the attacker already pwns the machine. This is a threat?
Yes, apparently if you ask an attacker if they are sure they want to run malicious code then 99% of times they will click "no". So not presenting this dialog is a massive security problem...if you're a complete idiot.
Doesn't break what UAC is intended for. (Score:5, Insightful)
Re: (Score:2)
It isn't even an extra layer of security if this isn't fixed, since the attack is a complete bypass.
But if you're doing the attack why go through that process when you could just run your code and click "Allow" on the UAC dialog instead? You need to be admin to do this attack anyway so you already have the privileges to run whatever code you want.
Improving windows! (Score:3, Insightful)
The attack allows an admin user to execute code in a high-integrity context without requiring the user to approve the administrative action via the UAC pop-up.
Thank goodness! I've been looking for a way around those annoying popups ever since they first arrived in Windows, and I know I'm not the only one.
UAC has a differnt goal (Score:3, Informative)
UAC has a different goal than you think.
https://channel9.msdn.com/Forums/Coffeehouse/473037-UAC-controversy-the-last-episode/773c9d79f8df4fa8bc489deb00e05c3d
Its goal is to force us to actually fix our crap. UAC is not a bandaid to fix all security issues. There are many known work arounds to it. Including turning it off.
Sweet vindication! (Score:2)
Re: (Score:2)
Exactly. Only platforms that have UAC are affected. That's the joke.
Re: (Score:2)
Treat both like a pile of insecure horseshit and you'll be better off instead of trusting whatever the
Re: (Score:2)
Who in their right mind runs Admin and turns off UAC?
Precisely.
You deserve malware if your doing that.
The described bypass (at least from my reading of the Slashdot summary) allows to bypass the UAC prompt even if UAC is turned on.
Just don't run as admin (Score:2)
Re: (Score:2)
It's actually even stupider than that. If you don't have UAC set to automatically elevate system binaries (like eventvwr.exe), this doesn't provide the attacker with anything either. UAC in Win7 introduced the idiotic notion that "trusted" programs would auto-elevate, rather than prompting, by default. There have been UAC bypasses based on this stupidity known for many years, this is just the latest in a long, long list.
To avert this, on Win7+, set UAC to "Always notify", rather than the default "Notify me
Re: (Score:2, Informative)
Re: (Score:2)
Re: (Score:2)
Am i reading this right? (Score:2)
Re: (Score:2)
No physical access required. Arbitrary code execution in a non-elevated context required, and then it can use that to elevate... if you're a member of the Administrators group, and still have the brain-dead UAC default "don't notify when I make changes to Windows settings" setting selected.
Re: (Score:2)
No physical access required. Arbitrary code execution in a non-elevated context required, and then it can use that to elevate... if you're a member of the Administrators group, and still have the brain-dead UAC default "don't notify when I make changes to Windows settings" setting selected.
An attacker would already need to be on the machine to use this technique
That pretty much is physical access. Not to mention that we're talking about a improperly configured environment. Nevertheless, it is a vulnerability that must be addressed and Microsoft's response is unacceptable. P.S.: I'm pretty sure that UAC doesn't allow you to make changes without being notified by default.
Windows can execute code? (Score:1)
Seems newsworthy.
Do you let users run as root on Linux? (Score:2)
No. I hope you do not. I don't run as admin on my Windows machines either. I run as Standard User so even if something bypasses UAC it can't do much because my account simply doesn't have those rights.
Re: (Score:2)
There's only one known UAC bypass if you switch to "Always Notify" from the brain-dead default setting that auto-elevates many Windows binaries , and there's a work-around for that one (the exploit itself is far more complicated than this one, too). Not arguing that running as not-a-member-of-Administrators isn't a good idea anyhow, because (from a security standpoint) it definitely is, but it's also a *mostly*-needless hassle.
Re: (Score:2)
Re: (Score:2)
wow (Score:2)