Closed GoogleCodeExporter closed 9 years ago
Original comment by fors...@google.com
on 26 Nov 2014 at 2:14
Update on IE EPM. I've managed to test it out and it seems it does work to
create a new process running with the normal user token, except with a Low IL
(that's a requirement of the vulnerability). Effectively this allows you to go
from EPM to the equivalent of PM, which from MS perspective is _not a security
boundary_ therefore I would class that as a sandbox escape.
This doesn't work on restricted tokens however due to the differences in how
restricted tokens are implemented. When creating a lowbox token the token is
duplicated and then all the lowbox data is added additional to the token. This
leaves the Token ParentID LUID the same as the original token, which is
probably the logon token in most cases. In restricted tokens the ParentID LUID
is set to the original token's ID so capturing the logon token doesn't help
because it will fail the sibling check. It could be used to impersonate a
slightly higher privileged token in limited circumstances if it was a token
which was _less_ restrictive than the original. For example between chrome
renderer and gpu processes which are generated from the same parent token.
I've attached a PoC for the IE EPM sandbox "escape" which uses
https://code.google.com/p/google-security-research/issues/detail?id=189 to get
a callback on a named pipe to acquire the impersonation token.
Original comment by fors...@google.com
on 28 Nov 2014 at 4:56
Attachments:
Original comment by fors...@google.com
on 2 Dec 2014 at 11:11
Bulletin: https://technet.microsoft.com/library/security/MS15-015
Original comment by cev...@google.com
on 10 Feb 2015 at 7:11
Remove view restriction
Original comment by fors...@google.com
on 18 Feb 2015 at 8:29
Original issue reported on code.google.com by
fors...@google.com
on 25 Nov 2014 at 7:29Attachments: