Bugtraq mailing list archives

Local privilege Escalation in SmartLine DeviceLock 5.73


From: seppi () seppig de
Date: 13 Aug 2006 10:26:26 -0000

The vulnerability constitutes of wrong ACLs on Device Object permission set by the driver.

Whenever your ACLs on a harddrive or partition, as configured by DeviceLock Manager, only consists of Allow entries 
(and Deny being the default), then the driver sets the ACLs on the kernel's internal object 
\Device\HarddiskX\PartitionY to Everyone:FullAccess, which allows complete read and write access to the raw file 
system, circumventing all access restrictions of NTFS. This behaviour can be easily verified by using Sysinternals' 
WinObj and dd.exe (dd if=\\.\C: | grep 'somesecretstuff') from GunWin32 or Win32-BinUtils (Cygwin should do the job as 
well) with a restricted user account.

In contrast, at least one explicit Deny entry leads to applying Everyone:DenyFullAccess, which effectively locks out 
even administrator users and the system, leading to certain problems with the Logical Volume Manager and some other 
system management utilities.

The vendor SmartLine has been informed about this vulnerability some weeks ago and verified it. However, they don't 
intend to release any patch, but rather refered to the upcoming version 6 of their software.

Workaround:
I didn't bother to check other objects for misplaced ACLs as well, but creating at least one explicit deny entry (as 
discussed above) should at least fix the vulnerability. It might also be possible to write a program that readjusts the 
ACLs on every reboot. Better uninstall this software at once.


Current thread: