Win10±£´æÍâµØÌáȨ0dayÎó²î

Ðû²¼Ê±¼ä 2018-08-30
Ò»¡¢Îó²îÐÎò


        2018Äê8ÔÂ27ÈÕ£¬£¬£¬£¬Çå¾²Ñо¿Ö°Ô±ÔÚTwitterÉÏÅû¶ÁËWindows 10ϵͳÖеÄÒ»¸ö0dayÎó²î¡£¡£¡£ ¡£¡£¡£¸ÃÎó²îÊÇÒ»¸öÍâµØÌáȨÎó²î£¬£¬£¬£¬±£´æÓÚWindowsµÄʹÃüµ÷ÀíЧÀÍÖУ¬£¬£¬£¬ÔÊÐí¹¥»÷Õß´ÓUSERȨÏÞÌáȨµ½SYSTEMȨÏÞ¡£¡£¡£ ¡£¡£¡£Î¢Èí¹Ù·½ÏÖÔÚ»¹Ã»ÓÐÌṩÏìÓ¦µÄ²¹¶¡¡£¡£¡£ ¡£¡£¡£


¶þ¡¢Îó²îÓ°Ïì¹æÄ£


        Windows 10


        Windows Server 2016


Èý¡¢Îó²îÆÊÎö


        Microsoft WindowsϵͳµÄʹÃüµ÷ÀíЧÀÍÖи߼¶ÍâµØÀú³ÌŲÓã¨ALPC£©½Ó¿Ú±£´æÍâµØÌáȨÎó²î£¬£¬£¬£¬¸ÃÎó²î±£´æÓÚschedsvc.dllÄ£¿£¿£¿éÖеÄSchRpcSetSecurityº¯Êý£¬£¬£¬£¬SchRpcSetSecurityº¯Êý½ç˵ÈçÏ£¬£¬£¬£¬º¯Êý¹¦Ð§ÊÇÉèÖÃÇå¾²ÐÎò·û¡£¡£¡£ ¡£¡£¡£


 HRESULT SchRpcSetSecurity(


   [in, string] const wchar_t* path,


   [in, string] const wchar_t* sddl,


   [in] DWORD flags


 );


        SchRpcSetSecurityµÚÒ»¸ö²ÎÊýΪ·¾¶path£¬£¬£¬£¬µÚ¶þ¸ö²ÎÊýΪÇå¾²ÐÎò·û½ç˵ÓïÑÔ (SDDL) ×Ö·û´®sddl£¬£¬£¬£¬¸Ãº¯ÊýÄÚ²¿Å²ÓÃÁËSetSecurity::RpcServerº¯Êý¡£¡£¡£ ¡£¡£¡£


c7c7ÓéÀÖÆ½Ì¨(ÖйúÓÎ)µÇ¼¹ÙÍøÈë¿Ú



        SetSecurity::RpcServerº¯ÊýÊ×ÏÈŲÓÃConvertStringSecurityDescriptorToSecurityDescriptor ½«SchRpcSetSecurityº¯Êý´«ÈëµÄsddl×Ö·û´®×ª»»ÎªÇå¾²ÐÎò·ûSecurityDescriptor¡£¡£¡£ ¡£¡£¡£²¢Å²ÓÃTaskPathCanonicalizeº¯Êý¶Ô´«Èëpath²ÎÊý·¾¶¹æ·¶»¯ÎªDst¡£¡£¡£ ¡£¡£¡£



c7c7ÓéÀÖÆ½Ì¨(ÖйúÓÎ)µÇ¼¹ÙÍøÈë¿Ú


        È»ºó»ñÈ¡Dst·¾¶µÄJobSecurityÇå¾²ÐÎò·ûpSecurityDescriptor£¬£¬£¬£¬¼Ì¶øÅ²ÓÃJobSecurity::Updateº¯Êý£¬£¬£¬£¬´«ÈëSecurityDescriptor²ÎÊý£¬£¬£¬£¬¸üÐÂpSecurityDescriptor¡£¡£¡£ ¡£¡£¡£



c7c7ÓéÀÖÆ½Ì¨(ÖйúÓÎ)µÇ¼¹ÙÍøÈë¿Ú


        ×îºó£¬£¬£¬£¬Å²ÓÃJobSecurity::AddRemovePrincipalAceº¯ÊýÉèÖÃDACL¡£¡£¡£ ¡£¡£¡£



c7c7ÓéÀÖÆ½Ì¨(ÖйúÓÎ)µÇ¼¹ÙÍøÈë¿Ú


        ÄÇôÔõÑùÐÞ¸ÄÖ¸¶¨Ä¿µÄÎļþµÄDACLÊôÐÔÄØ£¿£¿£¿Ê×ÏÈ£¬£¬£¬£¬Ê¹ÓÃZwSetInformationFileº¯ÊýΪĿµÄÎļþ½¨ÉèÓ²Á´½Ó¡£¡£¡£ ¡£¡£¡£È»ºó£¬£¬£¬£¬Å²ÓÃ_SchRpcSetSecurityº¯ÊýÉèÖÃÓ²Á´½ÓÎļþµÄDACL£¬£¬£¬£¬µÈͬÓÚÐÞ¸ÄÄ¿µÄÎļþµÄDACL¡£¡£¡£ ¡£¡£¡£Í¨¹ýÉèÖÃSchRpcSetSecurityµÄµÚ3¸ö²ÎÊý£¬£¬£¬£¬¿ÉÒÔΪÓû§Administrators(BA)¡¢Authenticated Users£¨AU£©Ìí¼Ó¶ÔÓ²Á´½ÓÎļþµÄдÈëȨÏÞ¡£¡£¡£ ¡£¡£¡£


        ÒÔPrintConfig.dllÎļþΪÀý£¬£¬£¬£¬Å²ÓÃSchRpcSetSecurityº¯Êýǰ£¬£¬£¬£¬Îļþ»á¼ûȨÏÞÈçÏ£¬£¬£¬£¬´ËʱAdministrators²»¾ßÓжÔÎļþµÄдÈëȨÏÞ¡£¡£¡£ ¡£¡£¡£


c7c7ÓéÀÖÆ½Ì¨(ÖйúÓÎ)µÇ¼¹ÙÍøÈë¿Ú



        ŲÓÃSchRpcSetSecurityº¯Êýºó£¬£¬£¬£¬ÎļþµÄȨÏÞÈçÏ£¬£¬£¬£¬´ËʱAdministratorsºÍAuthenticated Users¶¼ÓµÓжÔÎļþдÈëȨÏÞ¡£¡£¡£ ¡£¡£¡£


c7c7ÓéÀÖÆ½Ì¨(ÖйúÓÎ)µÇ¼¹ÙÍøÈë¿Ú



        ÓÉÓÚSchRpcSetSecurityº¯Êý±£´æÇå¾²Ñé֤ȱÏÝ£¬£¬£¬£¬Ê¹ÊÊÄ¿½ñÓû§¿ÉÐÞ¸ÄÖ»¶ÁÎļþµÄDACL£¬£¬£¬£¬Ìí¼ÓдÈëȨÏÞ¡£¡£¡£ ¡£¡£¡£ÀÖ³ÉʹÓøÃÎó²îµÄЧ¹ûÈçÏÂͼ¡£¡£¡£ ¡£¡£¡£



c7c7ÓéÀÖÆ½Ì¨(ÖйúÓÎ)µÇ¼¹ÙÍøÈë¿Ú


ËÄ¡¢Çå¾²½¨Òé


        ²»ÒªÔËÐÐδ֪ȪԴµÄ³ÌÐò£»£»£»£»


?     ÔÚ΢Èí¸üв¹¶¡ºó£¬£¬£¬£¬ÊµÊ±×°Öò¹¶¡¡£¡£¡£ ¡£¡£¡£


Îå¡¢²Î¿¼Á´½Ó


https://thehackernews.com/2018/08/windows-zero-day-exploit.html


https://www.kb.cert.org/vuls/id/906424