{"id":16142,"date":"2019-08-22T09:20:55","date_gmt":"2019-08-22T17:20:55","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/08\/22\/news-9885\/"},"modified":"2019-08-22T09:20:55","modified_gmt":"2019-08-22T17:20:55","slug":"news-9885","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/08\/22\/news-9885\/","title":{"rendered":"Blocking attacks against Windows \u201cCTF\u201d vulnerabilities"},"content":{"rendered":"<p><strong>Credit to Author: Mark Loman| Date: Thu, 22 Aug 2019 16:53:35 +0000<\/strong><\/p>\n<div class=\"entry-content\">\n<p>Operating systems and run-time environments typically provide some form of isolation between applications. For example, Windows runs each application in a separate process. This isolation stops code running in one application from adversely affecting other, unrelated applications.<\/p>\n<p>This means a non-administrative user mode process can&#8217;t access or tamper with kernel code and data, and an unauthorized user mode process can&#8217;t dig into the code and data of another process.<\/p>\n<p>But it turns out that Windows process isolation is imperfect, thanks to an undocumented and buggy component known only as &#8220;CTF&#8221;, part of the Windows Text Services Framework (TSF), that is present in all versions right back to Windows XP.<\/p>\n<p>The dated code and insecure design of this subsystem allows a non-administrative, unauthorized attacker to hijack any Windows process \u2013 including applications running in a sandbox like AppContainer \u2013 and to gain full admin rights.<\/p>\n<p>This design flaw in CTF was discovered and exploited by Google Project Zero researcher Tavis Ormandy, who wrote an in-depth <a href=\"https:\/\/googleprojectzero.blogspot.com\/2019\/08\/down-rabbit-hole.html\" rel=\"nofollow\">blog article<\/a> about his findings.<\/p>\n<p>Designated <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-1162\" rel=\"nofollow\">CVE-2019-1162<\/a>, Ormandy&#8217;s attack is what&#8217;s known as an Elevation of Privilege (EoP) vulnerability.<\/p>\n<p>That means it doesn\u2019t allow attackers to break into computers in the first place &#8211; to exploit this weakness, an attacker must already have got in, perhaps by using credentials stolen from another computer, by exploiting a remote code execution vulnerability, or by tricking the user into opening a booby-trapped document or running malicious software (malware).<\/p>\n<p>Nevertheless &#8211; even though Sophos Intercept X already stops attackers getting this initial foothold, and even though the CVE-2019-1162 bug has already been <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1162\" rel=\"nofollow\">patched by Microsoft<\/a> &#8211; we expect adversaries to try to find additional weakness in CTF, taking advantage of the attack surface that stems from CTF&#8217;s old and insecure design.<\/p>\n<p>So, the Sophos Threat Mitigation team has developed a system-level exploit mitigation that prevents abuse of the CTF subsystem.<\/p>\n<p>Dubbed <strong>CTF Guard<\/strong>, this new component intercepts and blocks applications that attempt to exploit CTF.<\/p>\n<p>For example, Tavis Ormandy&#8217;s <em>cfttool.exe<\/em>, described as an &#8220;interactive CTF exploration tool&#8221; that lets researchers probe and try to find holes in CTF, will be intercepted and terminated when it attempts to connect and communicate with the CTF subsystem:<\/p>\n<p><a href=\"https:\/\/sophos.files.wordpress.com\/2019\/08\/ctf-guard-832.png\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"59774\" data-permalink=\"https:\/\/news.sophos.com\/en-us\/2019\/08\/22\/blocking-attacks-against-windows-ctf-vulnerabilities\/ctf-guard-832\/\" data-orig-file=\"https:\/\/sophos.files.wordpress.com\/2019\/08\/ctf-guard-832.png\" data-orig-size=\"832,658\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"CTFGuard blocking ctftool.exe\" data-image-description=\"\" data-medium-file=\"https:\/\/sophos.files.wordpress.com\/2019\/08\/ctf-guard-832.png?w=300\" data-large-file=\"https:\/\/sophos.files.wordpress.com\/2019\/08\/ctf-guard-832.png?w=640\" class=\"alignnone wp-image-59774\" src=\"https:\/\/sophos.files.wordpress.com\/2019\/08\/ctf-guard-832.png?w=832&#038;h=658\" width=\"832\" height=\"658\" srcset=\"https:\/\/sophos.files.wordpress.com\/2019\/08\/ctf-guard-832.png 832w, https:\/\/sophos.files.wordpress.com\/2019\/08\/ctf-guard-832.png?w=150&amp;h=119 150w, https:\/\/sophos.files.wordpress.com\/2019\/08\/ctf-guard-832.png?w=300&amp;h=237 300w, https:\/\/sophos.files.wordpress.com\/2019\/08\/ctf-guard-832.png?w=768&amp;h=607 768w\" sizes=\"auto, (max-width: 832px) 100vw, 832px\" \/><\/a><\/p>\n<p style='margin-top:1.6em;'><strong>CFT Guard<\/strong> is already available in <a href=\"https:\/\/www.hitmanpro.com\">Sophos HitmanPro.Alert<\/a>, and is coming soon to <a href=\"https:\/\/www.sophos.com\/en-us\/products\/intercept-x.aspx?cmp=26104\">Sophos Intercept X<\/a>.<\/p>\n<\/p><\/div>\n<p><a href=\"http:\/\/feedproxy.google.com\/~r\/sophos\/dgdY\/~3\/N06wKBdEugM\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/sophos.files.wordpress.com\/2019\/08\/shutterstock_1250929048.jpg\"\/><\/p>\n<p><strong>Credit to Author: Mark Loman| Date: Thu, 22 Aug 2019 16:53:35 +0000<\/strong><\/p>\n<p>Operating systems and run-time environments typically provide some form of isolation between applications. For example, Windows runs each application in a separate process. This isolation stops code running in one application from adversely affecting other, unrelated applications. This means a non-administrative user mode process can&amp;#8217;t access or tamper with kernel code and data, and an [&amp;#8230;]&lt;img src=&#8221;http:\/\/feeds.feedburner.com\/~r\/sophos\/dgdY\/~4\/N06wKBdEugM&#8221; height=&#8221;1&#8243; width=&#8221;1&#8243; alt=&#8221;&#8221;\/&gt;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[10379,22718,10516,10525],"class_list":["post-16142","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-corporate","tag-cve-2019-1162","tag-microsoft","tag-windows"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16142","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16142"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16142\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16142"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16142"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16142"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}