Win10´æÔÚµ±µØÌáȨ0day©¶´
Ðû²¼Ê±¼ä 2018-08-302018Äê8ÔÂ27ÈÕ£¬Äþ¾²Ñо¿ÈËÔ±ÔÚTwitterÉÏÅû¶ÁËWindows 10ϵͳÖеÄÒ»¸ö0day©¶´¡£¸Ã©¶´ÊÇÒ»¸öµ±µØÌáȨ©¶´£¬´æÔÚÓÚWindowsµÄÈÎÎñµ÷ÖηþÎñÖУ¬ÔÊÐí¹¥»÷Õß´ÓUSERȨÏÞÌáȨµ½SYSTEMȨÏÞ¡£Î¢Èí¹Ù·½Ä¿Ç°»¹Ã»ÓÐÌṩÏàÓ¦µÄ²¹¶¡¡£
¶þ¡¢Â©¶´Ó°Ï췶Χ
Windows 10
Windows Server 2016
Èý¡¢Â©¶´·ÖÎö
Microsoft WindowsϵͳµÄÈÎÎñµ÷ÖηþÎñÖи߼¶µ±µØ¹ý³Ìµ÷Óã¨ALPC£©½Ó¿Ú´æÔÚµ±µØÌáȨ©¶´£¬¸Ã©¶´´æÔÚÓÚschedsvc.dllÄ£¿éÖеÄSchRpcSetSecurityº¯Êý£¬SchRpcSetSecurityº¯Êý½ç˵ÈçÏ£¬º¯Êý¹¦Ð§ÊÇÉèÖÃÄþ¾²ÃèÊö·û¡£
HRESULT SchRpcSetSecurity(
[in, string] const wchar_t* path,
[in, string] const wchar_t* sddl,
[in] DWORD flags
);
SchRpcSetSecurityµÚÒ»¸ö²ÎÊýΪ·¾¶path£¬µÚ¶þ¸ö²ÎÊýΪÄþ¾²ÃèÊö·û½ç˵ÓïÑÔ (SDDL) ×Ö·û´®sddl£¬¸Ãº¯ÊýÄÚ²¿µ÷ÓÃÁËSetSecurity::RpcServerº¯Êý¡£

SetSecurity::RpcServerº¯ÊýÊ×Ïȵ÷ÓÃConvertStringSecurityDescriptorToSecurityDescriptor ½«SchRpcSetSecurityº¯Êý´«ÈëµÄsddl×Ö·û´®×ª»»ÎªÄþ¾²ÃèÊö·ûSecurityDescriptor¡£²¢µ÷ÓÃTaskPathCanonicalizeº¯Êý¶Ô´«Èëpath²ÎÊý·¾¶¹æ·¶»¯ÎªDst¡£

È»ºó»ñÈ¡Dst·¾¶µÄJobSecurityÄþ¾²ÃèÊö·ûpSecurityDescriptor£¬¼Ì¶øµ÷ÓÃJobSecurity::Updateº¯Êý£¬´«ÈëSecurityDescriptor²ÎÊý£¬¸üÐÂpSecurityDescriptor¡£

×îºó£¬µ÷ÓÃJobSecurity::AddRemovePrincipalAceº¯ÊýÉèÖÃDACL¡£

ÄÇôÈçºÎÐÞ¸ÄÖ¸¶¨Ä¿±êÎļþµÄDACLÊôÐÔÄØ£¿Ê×ÏÈ£¬Ê¹ÓÃZwSetInformationFileº¯ÊýΪĿ±êÎļþ´´½¨Ó²Á´½Ó¡£È»ºó£¬µ÷ÓÃ_SchRpcSetSecurityº¯ÊýÉèÖÃÓ²Á´½ÓÎļþµÄDACL£¬µÈͬÓÚÐÞ¸ÄÄ¿±êÎļþµÄDACL¡£Í¨¹ýÉèÖÃSchRpcSetSecurityµÄµÚ3¸ö²ÎÊý£¬¿ÉÒÔΪÓû§Administrators(BA)¡¢Authenticated Users£¨AU£©Ìí¼Ó¶ÔÓ²Á´½ÓÎļþµÄдÈëȨÏÞ¡£
ÒÔPrintConfig.dllÎļþΪÀý£¬µ÷ÓÃSchRpcSetSecurityº¯ÊýÇ°£¬Îļþ·ÃÎÊȨÏÞÈçÏ£¬´ËʱAdministrators²»¾ßÓжÔÎļþµÄдÈëȨÏÞ¡£



ËÄ¡¢Äþ¾²½¨Òé
²»ÒªÔËÐÐδ֪À´Ô´µÄ·¨Ê½£»
? ÔÚ΢Èí¸üв¹¶¡ºó£¬¼°Ê±°²×°²¹¶¡¡£
Îå¡¢²Î¿¼Á´½Ó
https://thehackernews.com/2018/08/windows-zero-day-exploit.html
https://www.kb.cert.org/vuls/id/906424