Cargando…

Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode

Modern Operating Systems (OSs) enable user processes to obtain full access control over other processes initiated by the same user. In scenarios of sensitive security processes (e.g., antivirus software), protection schemes are enforced at the kernel level such as to confront arbitrary user processe...

Descripción completa

Detalles Bibliográficos
Autores principales: Ciholas, Pierre, Such, Jose Miguel, Marnerides, Angelos K., Green, Benjamin, Zhang, Jiajie, Roedig, Utz
Formato: Online Artículo Texto
Lenguaje:English
Publicado: 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7338165/
http://dx.doi.org/10.1007/978-3-030-52683-2_4
_version_ 1783554623874793472
author Ciholas, Pierre
Such, Jose Miguel
Marnerides, Angelos K.
Green, Benjamin
Zhang, Jiajie
Roedig, Utz
author_facet Ciholas, Pierre
Such, Jose Miguel
Marnerides, Angelos K.
Green, Benjamin
Zhang, Jiajie
Roedig, Utz
author_sort Ciholas, Pierre
collection PubMed
description Modern Operating Systems (OSs) enable user processes to obtain full access control over other processes initiated by the same user. In scenarios of sensitive security processes (e.g., antivirus software), protection schemes are enforced at the kernel level such as to confront arbitrary user processes overtaking with malicious intent. Within the Windows family of OSs, the kernel driver is notified via dedicated routines for user-mode processes that require protection. In such cases the kernel driver establishes a callback mechanism triggered whenever a handle request for the original user-mode process is initiated by a different user process. Subsequently, the kernel driver performs a selective permission removal process (e.g., read access to the process memory) prior to passing a handle to the requesting process. In this paper we are the first to demonstrate a fundamental user-mode process access control vulnerability, existing in Windows 7 up to the most recent Windows 10 OSs. We show that a user-mode process can indeed obtain a fully privileged access handle before the kernel driver is notified, thus prior to the callback mechanism establishment. Our study shows that this flaw can be exploited by a method to (i) disable the anti-malware suite Symantec Endpoint Protection; (ii) overtake VirtualBox protected processes; (iii) circumvent two major video game anti-cheat protection solutions, BattlEye and EasyAntiCheat. Finally we provide recommendations on how to address the discovered vulnerability.
format Online
Article
Text
id pubmed-7338165
institution National Center for Biotechnology Information
language English
publishDate 2020
record_format MEDLINE/PubMed
spelling pubmed-73381652020-07-07 Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode Ciholas, Pierre Such, Jose Miguel Marnerides, Angelos K. Green, Benjamin Zhang, Jiajie Roedig, Utz Detection of Intrusions and Malware, and Vulnerability Assessment Article Modern Operating Systems (OSs) enable user processes to obtain full access control over other processes initiated by the same user. In scenarios of sensitive security processes (e.g., antivirus software), protection schemes are enforced at the kernel level such as to confront arbitrary user processes overtaking with malicious intent. Within the Windows family of OSs, the kernel driver is notified via dedicated routines for user-mode processes that require protection. In such cases the kernel driver establishes a callback mechanism triggered whenever a handle request for the original user-mode process is initiated by a different user process. Subsequently, the kernel driver performs a selective permission removal process (e.g., read access to the process memory) prior to passing a handle to the requesting process. In this paper we are the first to demonstrate a fundamental user-mode process access control vulnerability, existing in Windows 7 up to the most recent Windows 10 OSs. We show that a user-mode process can indeed obtain a fully privileged access handle before the kernel driver is notified, thus prior to the callback mechanism establishment. Our study shows that this flaw can be exploited by a method to (i) disable the anti-malware suite Symantec Endpoint Protection; (ii) overtake VirtualBox protected processes; (iii) circumvent two major video game anti-cheat protection solutions, BattlEye and EasyAntiCheat. Finally we provide recommendations on how to address the discovered vulnerability. 2020-06-11 /pmc/articles/PMC7338165/ http://dx.doi.org/10.1007/978-3-030-52683-2_4 Text en © Springer Nature Switzerland AG 2020 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic.
spellingShingle Article
Ciholas, Pierre
Such, Jose Miguel
Marnerides, Angelos K.
Green, Benjamin
Zhang, Jiajie
Roedig, Utz
Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode
title Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode
title_full Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode
title_fullStr Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode
title_full_unstemmed Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode
title_short Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode
title_sort fast and furious: outrunning windows kernel notification routines from user-mode
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7338165/
http://dx.doi.org/10.1007/978-3-030-52683-2_4
work_keys_str_mv AT ciholaspierre fastandfuriousoutrunningwindowskernelnotificationroutinesfromusermode
AT suchjosemiguel fastandfuriousoutrunningwindowskernelnotificationroutinesfromusermode
AT marneridesangelosk fastandfuriousoutrunningwindowskernelnotificationroutinesfromusermode
AT greenbenjamin fastandfuriousoutrunningwindowskernelnotificationroutinesfromusermode
AT zhangjiajie fastandfuriousoutrunningwindowskernelnotificationroutinesfromusermode
AT roedigutz fastandfuriousoutrunningwindowskernelnotificationroutinesfromusermode