Does and can SBIE4 protect against win32k.sys vulnerability?
Posted: Wed Jun 25, 2014 10:51 am
Hello, everybody.
I have one question that tortures me for some time.
Big thank you to chris1341 and Malwar for the following informations.
Here it is:
s far as I know, the exploit is win32k.sys-is it true that Google Chrome protects against this exploit, and SBIE4 does not protect against win32k.sys?
Ok, I know that this most likely patched long time ago, but I am asking you this, because I was told that win32k.sys is an exploit does not need to start/run, and that's why it is able to bypass SBIE4 protection?
Here is my configuration in SBIE4:
ClosedFilePath=%Personal%\My Downloads\(block your personal info from malware)
ClosedFilePath=%Personal%\My Music\
ClosedFilePath=%Personal%\My Pictures\
ClosedFilePath=%My Video%\
ClosedFilePath=\Device\Mup\
ClosedFilePath=C:\WINDOWS\system\
ClosedFilePath=C:\WINDOWS\system32\kernel32.dll (It could say kernel64.dll instead of kernel32.dll depending on the operating system 32-bit or 64-bit)
ClosedFilePath=C:\WINDOWS\system32\t2embed.dll
ClosedFilePath=C:\WINDOWS\system32\win32k.sys
ClosedFilePath=!,InternetAccessDevices
ClosedIpcPath=!,*
As you can see I blocked those vulnerable dlls, and also I blocked win32k.sys, but from what I've heard is that win32k.sys bypassses SBIE4 because the only attacks that beat SBIE3 and 4 are kernel-level exploits (that do not require to start/run/execute), but these same exploits beat Google Chrome as well.'' They beat Chrome but it can be patched unlike SBIE which cannot be patched against wins32k.sys exploito_O
Is this trueo_O
I don't know if SBIE can fix this bypass or not, but I'm wondering if Google Chrome can be patched to protect against all kinds of exploits (including kernel-level exploits that do not need to start/run).
Also, keep in mind that if the following is true that we're looking at a handful at most changes in SBIE and 980 CVEs in Chrome in the last 5 years. That's because they do different things.
To look at how much work goes into Chrome to keep it safe take a look here:
http://www.cvedetails.com/product/15031 ... or_id=1224
I can't remember an ITW Chrome specific exploit but seem to remember some plug-ins were exploited because they run at higher integrity. I can think of 2 POCs that Tzuk issued security fixes for. What he was doing in the background regularly we'll never know.
Chrome had many fixes for security so was vulnerable to those attack vectors but how many were being used in actual exploits I'm not sure.
For it seems the only answer to this question is how many exploits (including kernel-level exploits that do not need to start/run) can Chrome block and be patched to protect against and against how many exploits (including kernel-level exploits that do not need to start/run) SBIE4 can be patched to protect against?
This is why I decided to do what I think it's the best for me: I use SBIE4 for Mozilla Firefox and for Internet Explorer, but I do not use SBIE4 with Google Chrome, I use Chrome unsandboxed.
Is it true that no matter how tight you configure sbie 3 or 4 it can be bypassed by the win32k.sys exploit-the reason SBIE can not block win32k.sys is because win32k.sys does not need anything to run to access the kernel-is this true?
Big thank you for your time and patience.
Also, is the following true, Fleischmann said:
"Exploit a Chrome tab and you have extremely restricted file-system and registry access (not even read and write for both in all cases), you can't
create new processes, can't read the clipboard and many other things. Exploit an Anti-Virus and you have admin rights, lol."
Does and can SBIE protect the same?
However like Rasheed said it would be interesting to see how many attacks Chrome would be able to block compared to all other web-browsers and SBIE.
The reason Chrome does not have the start/run restrictions of sandboxie is because it does not need them because it has no read/write to the file system. Chrome protects against drive-by malware-what about SBiE?
Also, Malwar said this:
I've been using sandboxie for about 3 years and still use it, but I use Chrome for browsing since it has a sandbox and sandboxie for everything I download. The reason Chrome is stronger then sandboxie is because it has NO read or write to the whole file system, also sandboxie relies on a driver and Chrome relies on Windows mechanisms.
The reason Chrome does not have the start/run restrictions of sandboxie is because it does not need them because it has no read/write to the file system. Chrome protects against drive-by malware.
Also, please not that Chrome broker runs at medium while SBIE broker runs at high integrity level. This could in theory be the reason why SBIE might fail and Chrome might pass when the exploit manages to escape out of the low right sandbox.
Honestly, I know SBIE has a incredible track record (and that's why I use it), so I doubt any vulnerabilities would not be patched by now.
Maybe Invincea can say something about this, since they have total review on how SBIE 3 and 4 work, and maybe they can say if SBIE has been patched against win32k.sys vulnerability?
Big thanks in advance, again.
What is here true and what is a myth?
This is all I want to know, big thank you, in advance, for your expert opinions, and big thank you for your time and patience!
I have one question that tortures me for some time.
Big thank you to chris1341 and Malwar for the following informations.
Here it is:
s far as I know, the exploit is win32k.sys-is it true that Google Chrome protects against this exploit, and SBIE4 does not protect against win32k.sys?
Ok, I know that this most likely patched long time ago, but I am asking you this, because I was told that win32k.sys is an exploit does not need to start/run, and that's why it is able to bypass SBIE4 protection?
Here is my configuration in SBIE4:
ClosedFilePath=%Personal%\My Downloads\(block your personal info from malware)
ClosedFilePath=%Personal%\My Music\
ClosedFilePath=%Personal%\My Pictures\
ClosedFilePath=%My Video%\
ClosedFilePath=\Device\Mup\
ClosedFilePath=C:\WINDOWS\system\
ClosedFilePath=C:\WINDOWS\system32\kernel32.dll (It could say kernel64.dll instead of kernel32.dll depending on the operating system 32-bit or 64-bit)
ClosedFilePath=C:\WINDOWS\system32\t2embed.dll
ClosedFilePath=C:\WINDOWS\system32\win32k.sys
ClosedFilePath=!,InternetAccessDevices
ClosedIpcPath=!,*
As you can see I blocked those vulnerable dlls, and also I blocked win32k.sys, but from what I've heard is that win32k.sys bypassses SBIE4 because the only attacks that beat SBIE3 and 4 are kernel-level exploits (that do not require to start/run/execute), but these same exploits beat Google Chrome as well.'' They beat Chrome but it can be patched unlike SBIE which cannot be patched against wins32k.sys exploito_O
Is this trueo_O
I don't know if SBIE can fix this bypass or not, but I'm wondering if Google Chrome can be patched to protect against all kinds of exploits (including kernel-level exploits that do not need to start/run).
Also, keep in mind that if the following is true that we're looking at a handful at most changes in SBIE and 980 CVEs in Chrome in the last 5 years. That's because they do different things.
To look at how much work goes into Chrome to keep it safe take a look here:
http://www.cvedetails.com/product/15031 ... or_id=1224
I can't remember an ITW Chrome specific exploit but seem to remember some plug-ins were exploited because they run at higher integrity. I can think of 2 POCs that Tzuk issued security fixes for. What he was doing in the background regularly we'll never know.
Chrome had many fixes for security so was vulnerable to those attack vectors but how many were being used in actual exploits I'm not sure.
For it seems the only answer to this question is how many exploits (including kernel-level exploits that do not need to start/run) can Chrome block and be patched to protect against and against how many exploits (including kernel-level exploits that do not need to start/run) SBIE4 can be patched to protect against?
This is why I decided to do what I think it's the best for me: I use SBIE4 for Mozilla Firefox and for Internet Explorer, but I do not use SBIE4 with Google Chrome, I use Chrome unsandboxed.
Is it true that no matter how tight you configure sbie 3 or 4 it can be bypassed by the win32k.sys exploit-the reason SBIE can not block win32k.sys is because win32k.sys does not need anything to run to access the kernel-is this true?
Big thank you for your time and patience.
Also, is the following true, Fleischmann said:
"Exploit a Chrome tab and you have extremely restricted file-system and registry access (not even read and write for both in all cases), you can't
create new processes, can't read the clipboard and many other things. Exploit an Anti-Virus and you have admin rights, lol."
Does and can SBIE protect the same?
However like Rasheed said it would be interesting to see how many attacks Chrome would be able to block compared to all other web-browsers and SBIE.
The reason Chrome does not have the start/run restrictions of sandboxie is because it does not need them because it has no read/write to the file system. Chrome protects against drive-by malware-what about SBiE?
Also, Malwar said this:
I've been using sandboxie for about 3 years and still use it, but I use Chrome for browsing since it has a sandbox and sandboxie for everything I download. The reason Chrome is stronger then sandboxie is because it has NO read or write to the whole file system, also sandboxie relies on a driver and Chrome relies on Windows mechanisms.
The reason Chrome does not have the start/run restrictions of sandboxie is because it does not need them because it has no read/write to the file system. Chrome protects against drive-by malware.
Also, please not that Chrome broker runs at medium while SBIE broker runs at high integrity level. This could in theory be the reason why SBIE might fail and Chrome might pass when the exploit manages to escape out of the low right sandbox.
Honestly, I know SBIE has a incredible track record (and that's why I use it), so I doubt any vulnerabilities would not be patched by now.
Maybe Invincea can say something about this, since they have total review on how SBIE 3 and 4 work, and maybe they can say if SBIE has been patched against win32k.sys vulnerability?
Big thanks in advance, again.
What is here true and what is a myth?
This is all I want to know, big thank you, in advance, for your expert opinions, and big thank you for your time and patience!