Windows Defender security flaw

  • Thread starter Thread starter Anonymous Bob
  • Start date Start date
A

Anonymous Bob

Mark Russinovich has been busy again. :-)

In his latest blog, he investigates privilege escalation and he found that
the WD service executable was installed in the Program Files folder with
default security settings. It's a good read.

"Another somewhat ironic example is Microsoft Windows Defender Beta 2, which
installs its service executable in \Program Files\Windows Defender with
default security settings. Replacing these service image files is a quick
path to administrator privilege and is even easier than replacing files in
the \Windows directory because WFP doesn't meddle with replacements."

http://www.sysinternals.com/blog/2006/05/power-in-power-users.html

I'd look for this to change real soon now. ;-)

Bob Vanderveen
 
Thanks. It'd be interesting to understand the extra protections available
in Vista, and whether the same "flaw" is present there. I suspect it isn't
and that this is one side-effect, perhaps, of learning how to safely
back-port code designed for Vista to the older OS versions. (but then
again, I can't be called a programmer anymore, so I could be way off base!)
 
Back
Top