{"id":16667,"date":"2021-07-07T16:12:43","date_gmt":"2021-07-07T14:12:43","guid":{"rendered":"https:\/\/herolab-usd.formwandler.rocks\/security-advisories\/usd-2020-0016\/"},"modified":"2021-07-19T14:14:46","modified_gmt":"2021-07-19T12:14:46","slug":"usd-2020-0016","status":"publish","type":"page","link":"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2020-0016\/","title":{"rendered":"usd-2020-0016"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.9.4\" _module_preset=\"default\" background_color=\"#2E353D\" custom_padding=\"||0px|||\"][et_pb_row _builder_version=\"4.9.4\" _module_preset=\"default\"][et_pb_column type=\"4_4\" _builder_version=\"4.9.4\" _module_preset=\"default\"][et_pb_text _builder_version=\"4.9.4\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" hover_enabled=\"0\" sticky_enabled=\"0\"]<\/p>\n<h1 class=\"h-custom-headline usd-small-letters h2\"><span>usd-2020-0016 | Symantec Endpoint Protection 14.2.2.1<\/span><\/h1>\n<p><span><\/span><br \/><strong>Advisory ID<\/strong><span>: usd-2020-0016<\/span><br \/><strong>CVE Number<\/strong><span>: CVE-2020-5836<\/span><br \/><strong>Affected Product<\/strong><span>: Symantec Endpoint Protection<\/span><br \/><strong>Affected Version<\/strong><span>: 14.2.2.1<\/span><br \/><strong>Vulnerability Type<\/strong><span>: Hardlink Vulnerability<\/span><br \/><strong>Security Risk<\/strong><span>: Critical<\/span><br \/><strong>Vendor URL<\/strong><span>: <\/span><a href=\"https:\/\/www.broadcom.com\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.broadcom.com\/<\/a><br \/><strong>Vendor Status<\/strong><span>: Fixed<\/span><br \/><strong>Vendor Advisory<\/strong><span>: <\/span><a href=\"https:\/\/support.broadcom.com\/security-advisory\/content\/security-advisories\/Symantec-Endpoint-Protection-Security-Update\/SYMSA1762\" target=\"_blank\" rel=\"noopener\">https:\/\/support.broadcom.com\/security-advisory\/content\/security-advisories\/Symantec-Endpoint-Protection-Security-Update\/SYMSA1762<\/a><\/p>\n<h3><\/h3>\n<h3>Description<\/h3>\n<p><span>Hardlink attacks become more and more popular on Windows operating systems. A hardlink is just a directory entry that points to an already existing file and redirects certain file operations to the actual target. When privileged processes interact with user controlled parts of the file system, hardlinks can be used to redirect privileged file operations in order to achieve an elevation of privileges. In the most recent versions of Windows, mitigations against hardlink attacks have been implemented. These require write access to the targeted file during link creation and protect from attacks like demonstrated in the following. However, unpatched systems are still vulnerable to this type of attack.<\/span><\/p>\n<p><span><\/span><\/p>\n<h3>Proof of Concept (PoC)<\/h3>\n<p><span>Inside the directory <\/span><em>C:\\ProgramData\\Symantec\\Symantec Endpoint Protection\\14.0.3752.1000.105\\Data\\IPS<\/em><span>, the Symantec Endpoint Protection service stores several different files. One set of them are of particular interest, since they are modifiable by low privileged user accounts:<\/span><\/p>\n<p>[\/et_pb_text][et_pb_image src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2021\/07\/usd20200016-2.png\" _builder_version=\"4.9.4\" _module_preset=\"default\" title_text=\"usd20200016-2\" hover_enabled=\"0\" sticky_enabled=\"0\"][\/et_pb_image][et_pb_text _builder_version=\"4.9.4\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" hover_enabled=\"0\" sticky_enabled=\"0\"]<\/p>\n<p><span>Despite being modifiable by low privileged users, all the above mentioned files are owned by high privileged users.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_image src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2021\/07\/usd20200016-3.png\" _builder_version=\"4.9.4\" _module_preset=\"default\" title_text=\"usd20200016-3\" hover_enabled=\"0\" sticky_enabled=\"0\"][\/et_pb_image][et_pb_text _builder_version=\"4.9.4\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" custom_margin=\"||27px||false|false\" hover_enabled=\"0\" sticky_enabled=\"0\"]<\/p>\n<p><span>Since the <\/span><em>C:\\ProgramData\\Symantec\\Symantec Endpoint Protection\\14.0.3752.1000.105\\Data\\IPS<\/em><span> folder is also writable by low privileged user accounts, it is possible to replace the file <\/span><em>PEP_RUL.dat.bak<\/em><span> with a hardlink that points to a different file. In the following example, the <\/span><a href=\"https:\/\/github.com\/googleprojectzero\/symboliclink-testing-tools\" target=\"_blank\" rel=\"noopener\">symboliclink-testing-tools<\/a><span> of James Forshaw are used to create the hardlink:<\/span><\/p>\n<p>[\/et_pb_text][et_pb_image src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2021\/07\/usd20200016-4.png\" title_text=\"usd20200016-4\" _builder_version=\"4.9.4\" _module_preset=\"default\" custom_margin=\"27px||43px||false|false\" hover_enabled=\"0\" sticky_enabled=\"0\"][\/et_pb_image][et_pb_text _builder_version=\"4.9.4\" _module_preset=\"default\" hover_enabled=\"0\" sticky_enabled=\"0\"]<\/p>\n<p><span>After the hardlink was placed, the Symantec Endpoint Protection service needs to be restarted. On a workstation, this can be achieved by restarting the computer.<\/span><br \/><span>The following events can be captured after the restart:<\/span><\/p>\n<p>[\/et_pb_text][et_pb_image src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2021\/07\/usd20200016-1.png\" _builder_version=\"4.9.4\" _module_preset=\"default\" title_text=\"usd20200016-1\" hover_enabled=\"0\" sticky_enabled=\"0\"][\/et_pb_image][et_pb_text _builder_version=\"4.9.4\" _module_preset=\"default\" hover_enabled=\"0\" sticky_enabled=\"0\"]<\/p>\n<p><span>As one can see, the access permissions on the hardlink get modified. One can verify that this change also effects the targeted file by viewing its permission:<\/span><\/p>\n<p>[\/et_pb_text][et_pb_image src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2021\/07\/usd20200016-5.png\" _builder_version=\"4.9.4\" _module_preset=\"default\" title_text=\"usd20200016-5\" hover_enabled=\"0\" sticky_enabled=\"0\"][\/et_pb_image][et_pb_text _builder_version=\"4.9.4\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" hover_enabled=\"0\" sticky_enabled=\"0\"]<\/p>\n<div class=\"e16902-22 x-container max width\">\n<div class=\"e16902-23 x-column x-sm x-1-1\">\n<p><span>Low privileged users now have write access to the targeted file. By using this attack on service executables or DLL files, it is easy for a local attacker to achieve an elevation of privileges.<\/span><\/p>\n<p><span><\/span><\/p>\n<h3>Fix<\/h3>\n<p><span>As the folder <\/span><em>C:\\ProgramData\\Symantec\\Symantec Endpoint Protection\\14.0.3752.1000.105\\Data\\IPS<\/em><span> does only contain files owned by high privileged user accounts, it is questionable if it needs to be writable by low privileged users. Denying write access on this directory could be one possible fix. Inspecting targeted files before performing privileged file operations on them can also be used to prevent the demonstrated attack.<\/span><\/p>\n<h3><\/h3>\n<h3>References<\/h3>\n<p><a href=\"https:\/\/googleprojectzero.blogspot.com\/2015\/12\/between-rock-and-hard-link.html\" target=\"_blank\" rel=\"noopener\">https:\/\/googleprojectzero.blogspot.com\/2015\/12\/between-rock-and-hard-link.html<\/a><\/p>\n<h3><\/h3>\n<h3>Timeline<\/h3>\n<ul>\n<li>2020-03-12 First contact request via symantec.psirt@broadcom.com<\/li>\n<li>2020-05-05 Fix is released in Symantec Endpoint Protection 14.3<\/li>\n<li>2020-05-11 Broadcom publishes Advisory: <a href=\"https:\/\/support.broadcom.com\/security-advisory\/content\/security-advisories\/Symantec-Endpoint-Protection-Security-Update\/SYMSA1762\" target=\"_blank\" rel=\"noopener\">https:\/\/support.broadcom.com\/security-advisory\/content\/security-advisories\/Symantec-Endpoint-Protection-Security-Update\/SYMSA1762<\/a><\/li>\n<li>2020-06-18\u00a0Security advisory released<\/li>\n<\/ul>\n<h3><\/h3>\n<h3>Credits<\/h3>\n<p><span>This security vulnerability was found by Tobias Neitzel and Lars Neumann of usd AG.<\/span><\/p>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>usd-2020-0016 | Symantec Endpoint Protection 14.2.2.1 Advisory ID: usd-2020-0016CVE Number: CVE-2020-5836Affected Product: Symantec Endpoint ProtectionAffected Version: 14.2.2.1Vulnerability Type: Hardlink VulnerabilitySecurity Risk: CriticalVendor URL: https:\/\/www.broadcom.com\/Vendor Status: FixedVendor Advisory: https:\/\/support.broadcom.com\/security-advisory\/content\/security-advisories\/Symantec-Endpoint-Protection-Security-Update\/SYMSA1762 Description Hardlink attacks become more and more popular on Windows operating systems. A hardlink is just a directory entry that points to an already existing file and [&hellip;]<\/p>\n","protected":false},"author":96,"featured_media":0,"parent":16124,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-16667","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16667","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/comments?post=16667"}],"version-history":[{"count":0,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16667\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16124"}],"wp:attachment":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/media?parent=16667"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}