I choose to test Sandboxie with a Windows Media Video file (.WMV) took from eMule, and I choose a 900kb (censored) file for this test (because I think some WMV are amongst the most dangerous ones, in some cases even GMER isn't able to detect rootkit in them, as stated on their site). I don't know if I'm allowed to paste the file name and the ED2K Link here, I won't do it until an admin/moderator says it's ok with the board rules. javascript:emoticon('
Wink
Anyway, I simply right-clicked the file, and opened it with the option "Run Sandboxed". Then, the following happens: first, this file tipically tries to acquire a License; then, I deny the request by hitting the "Cancel" button; at this point, the WMV file automatically opens an IE instance, pointing to a web page.
The problem is that the IE session isn't sandboxed, despite being invoked by a program which I verified it is (Windows Media Player). I say this because:
- I saw the wmplayer.exe process is correctly sandboxed (the # signs are present in the WMP window, and wmplayer.exe is present in Sandboxie's sandboxed process list).
- The IE process invoked by WMP, by contrast, is not sandboxed (no # signs in the IE window, and no iexplore.exe process in Sandboxie's process list).
I tried this three times, and the result is the same. The test configuration I used is as follow:
- Windows 2000 Pro SP4 with all the security patches up to present.
- Windows 2000 runs inside VMWare 5.5.2 build-29772
- Windows Media Player 9.00.00.3354
- The Windows account used for this test belongs to the Users Group (no Admin rights).
- Sandboxie 3.01, installed the first time as Administrator, with all options as defaults, then logged off and run since then as the limited user (I mean with regular account logon, not under RunAs Service or other equivalents) with no other problems with apps like FF 2.0.0.6 and eMule 0.48A.
- I granted the limited account full ACL rights to the file %SystemRoot%\Sandboxie.ini.
- Everytime Sandboxie driver is correctly loaded as localsystem, process control.exe is running correctly, and the other two apps controlled by SandboxieRpcSs.exe (FF & eMule), too.
For some reasons I don't understand, it seems the WMV file managed to elude the security layer provided by the sandbox, because it didn't intercept the launch request made by WMP to open IE. Relevant note: having read on this forum about the problem (then revealed as false) regarding Icesword allegedly by-passing Sandboxie, it is important to say that I never launched this WMV file, nor any other multimedia file before, not inside neither outside Sandboxie, as my Windows-2000-inside-VMWare installation is new and I revert it back to original almost every day.
Any clue?
Please forgive my English and thanks a lot to Tzur for his great program and for his constant support in this forum, and to all of you.
Pinco Pallaccio, pincopallaccio@tiscali.it
A collaborative and happy Sandboxie user
