full-disclosure-uk May 2007 archive
Main Archive Page > Month Archives  > full-disclosure-uk archives
full-disclosure-uk: [Full-disclosure] Bypassing PFW/HIPS open pr

[Full-disclosure] Bypassing PFW/HIPS open process control with uncommon identifier

From: Matousec - Transparent security Research <research_at_nospam>
Date: Tue May 15 2007 - 07:38:34 GMT
To: full-disclosure@lists.grok.org.uk


We would like to inform you about a vulnerability in personal firewalls and HIPS software.


Windows operating systems with NT kernel version 5.0 and higher (i.e. Windows 2000, XP, 2003) use integer numbers divisible by four to identify processes. Internal implementation of system API functions also allows programmers to use integers that are not divisible by four. This means that for every process running in the system there are four valid identifiers.

The control of API functions, which work with process identifiers, like OpenProcess (usually implemented by SSDT hook of NtOpenProcess), that assumes using identifiers divisible by four is insufficient. An implementation by a simple test on equivalence between the internal personal firewall/HIPS database and the given identifier can be dangerous. In such case, it is possible that a firewall misinterprets a call and allows an action that should be forbidden. If the security software implements a process protection for critical processes in this manner, it is a critical bug, which can be exploited to gain control over the whole system. Vulnerable products implements process protection, which can be bypassed if identifiers not divisible by four are used.

Vulnerable software:

  • Comodo Firewall Pro
  • Comodo Personal Firewall
  • ZoneAlarm Pro 6.1.744.001
  • probably older versions of above mentioned products
  • possibly other personal firewalls and HIPS software

Not vulnerable software:

  • ZoneAlarm Pro 6.5.737.000 and higher

More details and a proof of concept including its source code are available here: http://www.matousec.com/info/advisories/Bypassing-PWF-HIPS-open-process-control-with-uncommon-identifier.php

Regards, -- Matousec - Transparent security Research http://www.matousec.com/ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/