Win10±£´æÍâµØÌáȨ0dayÎó²î
Ðû²¼Ê±¼ä 2018-08-302018Äê8ÔÂ27ÈÕ£¬£¬£¬Çå¾²Ñо¿Ö°Ô±ÔÚTwitterÉÏÅû¶ÁËWindows 10ϵͳÖеÄÒ»¸ö0dayÎó²î¡£¡£¡£¡£¡£¸ÃÎó²îÊÇÒ»¸öÍâµØÌáȨÎó²î£¬£¬£¬±£´æÓÚWindowsµÄʹÃüµ÷ÀíЧÀÍÖУ¬£¬£¬ÔÊÐí¹¥»÷Õß´ÓUSERȨÏÞÌáȨµ½SYSTEMȨÏÞ¡£¡£¡£¡£¡£Î¢Èí¹Ù·½ÏÖÔÚ»¹Ã»ÓÐÌṩÏìÓ¦µÄ²¹¶¡¡£¡£¡£¡£¡£
¶þ¡¢Îó²îÓ°Ïì¹æÄ£
Windows 10
Windows Server 2016
Èý¡¢Îó²îÆÊÎö
Microsoft WindowsϵͳµÄʹÃüµ÷ÀíЧÀÍÖи߼¶ÍâµØÀú³ÌŲÓã¨ALPC£©½Ó¿Ú±£´æÍâµØÌáȨÎó²î£¬£¬£¬¸ÃÎó²î±£´æÓÚschedsvc.dllÄ£¿£¿£¿£¿éÖеÄSchRpcSetSecurityº¯Êý£¬£¬£¬SchRpcSetSecurityº¯Êý½ç˵ÈçÏ£¬£¬£¬º¯Êý¹¦Ð§ÊÇÉèÖÃÇå¾²ÐÎò·û¡£¡£¡£¡£¡£
HRESULT SchRpcSetSecurity(
[in, string] const wchar_t* path,
[in, string] const wchar_t* sddl,
[in] DWORD flags
);
SchRpcSetSecurityµÚÒ»¸ö²ÎÊýΪ·¾¶path£¬£¬£¬µÚ¶þ¸ö²ÎÊýΪÇå¾²ÐÎò·û½ç˵ÓïÑÔ (SDDL) ×Ö·û´®sddl£¬£¬£¬¸Ãº¯ÊýÄÚ²¿Å²ÓÃÁËSetSecurity::RpcServerº¯Êý¡£¡£¡£¡£¡£
SetSecurity::RpcServerº¯ÊýÊ×ÏÈŲÓÃConvertStringSecurityDescriptorToSecurityDescriptor ½«SchRpcSetSecurityº¯Êý´«ÈëµÄsddl×Ö·û´®×ª»»ÎªÇå¾²ÐÎò·ûSecurityDescriptor¡£¡£¡£¡£¡£²¢Å²ÓÃTaskPathCanonicalizeº¯Êý¶Ô´«Èëpath²ÎÊý·¾¶¹æ·¶»¯ÎªDst¡£¡£¡£¡£¡£
È»ºó»ñÈ¡Dst·¾¶µÄJobSecurityÇå¾²ÐÎò·ûpSecurityDescriptor£¬£¬£¬¼Ì¶øÅ²ÓÃJobSecurity::Updateº¯Êý£¬£¬£¬´«ÈëSecurityDescriptor²ÎÊý£¬£¬£¬¸üÐÂpSecurityDescriptor¡£¡£¡£¡£¡£
×îºó£¬£¬£¬Å²ÓÃJobSecurity::AddRemovePrincipalAceº¯ÊýÉèÖÃDACL¡£¡£¡£¡£¡£
ÄÇôÔõÑùÐÞ¸ÄÖ¸¶¨Ä¿µÄÎļþµÄDACLÊôÐÔÄØ£¿£¿£¿£¿Ê×ÏÈ£¬£¬£¬Ê¹ÓÃZwSetInformationFileº¯ÊýΪĿµÄÎļþ½¨ÉèÓ²Á´½Ó¡£¡£¡£¡£¡£È»ºó£¬£¬£¬Å²ÓÃ_SchRpcSetSecurityº¯ÊýÉèÖÃÓ²Á´½ÓÎļþµÄDACL£¬£¬£¬µÈͬÓÚÐÞ¸ÄÄ¿µÄÎļþµÄDACL¡£¡£¡£¡£¡£Í¨¹ýÉèÖÃSchRpcSetSecurityµÄµÚ3¸ö²ÎÊý£¬£¬£¬¿ÉÒÔΪÓû§Administrators(BA)¡¢Authenticated Users£¨AU£©Ìí¼Ó¶ÔÓ²Á´½ÓÎļþµÄдÈëȨÏÞ¡£¡£¡£¡£¡£
ÒÔPrintConfig.dllÎļþΪÀý£¬£¬£¬Å²ÓÃSchRpcSetSecurityº¯Êýǰ£¬£¬£¬Îļþ»á¼ûȨÏÞÈçÏ£¬£¬£¬´ËʱAdministrators²»¾ßÓжÔÎļþµÄдÈëȨÏÞ¡£¡£¡£¡£¡£
ËÄ¡¢Çå¾²½¨Òé
²»ÒªÔËÐÐδ֪ȪԴµÄ³ÌÐò£»£»
? ÔÚ΢Èí¸üв¹¶¡ºó£¬£¬£¬ÊµÊ±×°Öò¹¶¡¡£¡£¡£¡£¡£
Îå¡¢²Î¿¼Á´½Ó
https://thehackernews.com/2018/08/windows-zero-day-exploit.html
https://www.kb.cert.org/vuls/id/906424


¾©¹«Íø°²±¸11010802024551ºÅ