Changeset 97023 in vbox for trunk/src/VBox/HostDrivers
- Timestamp:
- Oct 6, 2022 8:23:59 AM (2 years ago)
- svn:sync-xref-src-repo-rev:
- 153956
- Location:
- trunk/src/VBox/HostDrivers/Support/win
- Files:
-
- 2 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/src/VBox/HostDrivers/Support/win/SUPDrv-win.cpp
r96407 r97023 4943 4943 4944 4944 4945 static const char *supdrvNtProtectHandleTypeIndexToName(ULONG idxType, char *pszName, size_t cbName) 4946 { 4947 /* 4948 * Query the object types. 4949 */ 4950 uint32_t cbBuf = _8K; 4951 uint8_t *pbBuf = (uint8_t *)RTMemAllocZ(_8K); 4952 ULONG cbNeeded = cbBuf; 4953 NTSTATUS rcNt = NtQueryObject(NULL, ObjectTypesInformation, pbBuf, cbBuf, &cbNeeded); 4954 while (rcNt == STATUS_INFO_LENGTH_MISMATCH) 4955 { 4956 cbBuf = RT_ALIGN_32(cbNeeded + 256, _64K); 4957 RTMemFree(pbBuf); 4958 pbBuf = (uint8_t *)RTMemAllocZ(cbBuf); 4959 if (pbBuf) 4960 rcNt = NtQueryObject(NULL, ObjectTypesInformation, pbBuf, cbBuf, &cbNeeded); 4961 else 4962 break; 4963 } 4964 if (NT_SUCCESS(rcNt)) 4965 { 4966 Assert(cbNeeded <= cbBuf); 4967 4968 POBJECT_TYPES_INFORMATION pObjTypes = (OBJECT_TYPES_INFORMATION *)pbBuf; 4969 POBJECT_TYPE_INFORMATION pCurType = &pObjTypes->FirstType; 4970 ULONG cLeft = pObjTypes->NumberOfTypes; 4971 while (cLeft-- > 0 && (uintptr_t)&pCurType[1] - (uintptr_t)pbBuf < cbNeeded) 4972 { 4973 if (pCurType->TypeIndex == idxType) 4974 { 4975 PCRTUTF16 const pwszSrc = pCurType->TypeName.Buffer; 4976 AssertBreak(pwszSrc); 4977 size_t idxName = pCurType->TypeName.Length / sizeof(RTUTF16); 4978 AssertBreak(idxName > 0); 4979 AssertBreak(idxName < 128); 4980 if (idxName >= cbName) 4981 idxName = cbName - 1; 4982 pszName[idxName] = '\0'; 4983 while (idxName-- > 0) 4984 pszName[idxName] = (char )pwszSrc[idxName]; 4985 RTMemFree(pbBuf); 4986 return pszName; 4987 } 4988 4989 /* next */ 4990 pCurType = (POBJECT_TYPE_INFORMATION)( (uintptr_t)pCurType->TypeName.Buffer 4991 + RT_ALIGN_32(pCurType->TypeName.MaximumLength, sizeof(uintptr_t))); 4992 } 4993 } 4994 4995 RTMemFree(pbBuf); 4996 return "unknown"; 4997 } 4998 4999 4945 5000 /** 4946 5001 * Worker for supdrvNtProtectVerifyProcess that verifies the handles to a VM … … 5009 5064 uint32_t cBenignThreadHandles = 0; 5010 5065 5066 uint32_t cEvilInheritableHandles = 0; 5067 uint32_t cBenignInheritableHandles = 0; 5068 char szTmpName[32]; 5069 5011 5070 SYSTEM_HANDLE_INFORMATION_EX const *pInfo = (SYSTEM_HANDLE_INFORMATION_EX const *)pbBuf; 5012 5071 ULONG_PTR i = pInfo->NumberOfHandles; … … 5070 5129 cEvilThreadHandles++; 5071 5130 pszType = "thread"; 5131 } 5132 else if ( (pHandleInfo->HandleAttributes & OBJ_INHERIT) 5133 && pHandleInfo->UniqueProcessId == hProtectedPid) 5134 { 5135 /* No handles should be marked inheritable, except files and two events. 5136 Handles to NT 'directory' objects are especially evil, because of 5137 KnownDlls faking. See bugref{10294} for details. 5138 5139 Correlating the ObjectTypeIndex to a type is complicated, so instead 5140 we try referecing the handle and check the type that way. So, only 5141 file and events objects are allowed to be marked inheritable at the 5142 moment. Add more in whitelist fashion if needed. */ 5143 void *pvObject = NULL; 5144 rcNt = ObReferenceObjectByHandle(pHandleInfo->HandleValue, 0, *IoFileObjectType, KernelMode, &pvObject, NULL); 5145 if (rcNt == STATUS_OBJECT_TYPE_MISMATCH) 5146 rcNt = ObReferenceObjectByHandle(pHandleInfo->HandleValue, 0, *ExEventObjectType, KernelMode, &pvObject, NULL); 5147 if (NT_SUCCESS(rcNt)) 5148 { 5149 ObDereferenceObject(pvObject); 5150 cBenignInheritableHandles++; 5151 continue; 5152 } 5153 5154 if (rcNt != STATUS_OBJECT_TYPE_MISMATCH) 5155 { 5156 cBenignInheritableHandles++; 5157 continue; 5158 } 5159 5160 cEvilInheritableHandles++; 5161 pszType = supdrvNtProtectHandleTypeIndexToName(pHandleInfo->ObjectTypeIndex, szTmpName, sizeof(szTmpName)); 5072 5162 } 5073 5163 else … … 5100 5190 || g_pfnObRegisterCallbacks) 5101 5191 { 5102 LogRel(("vboxdrv: Found evil handle to budding VM process: pid=%p h=%p acc=%#x attr=%#x type=%s \n",5192 LogRel(("vboxdrv: Found evil handle to budding VM process: pid=%p h=%p acc=%#x attr=%#x type=%s (%u)\n", 5103 5193 pHandleInfo->UniqueProcessId, pHandleInfo->HandleValue, 5104 pHandleInfo->GrantedAccess, pHandleInfo->HandleAttributes, pszType ));5194 pHandleInfo->GrantedAccess, pHandleInfo->HandleAttributes, pszType, pHandleInfo->ObjectTypeIndex)); 5105 5195 rc = RTErrInfoAddF(pErrInfo, VERR_SUPDRV_HARDENING_EVIL_HANDLE, 5106 5196 *pErrInfo->pszMsg 5107 ? "\nFound evil handle to budding VM process: pid=%p h=%p acc=%#x attr=%#x type=%s "5108 : "Found evil handle to budding VM process: pid=%p h=%p acc=%#x attr=%#x type=%s ",5197 ? "\nFound evil handle to budding VM process: pid=%p h=%p acc=%#x attr=%#x type=%s (%u)" 5198 : "Found evil handle to budding VM process: pid=%p h=%p acc=%#x attr=%#x type=%s (%u)", 5109 5199 pHandleInfo->UniqueProcessId, pHandleInfo->HandleValue, 5110 pHandleInfo->GrantedAccess, pHandleInfo->HandleAttributes, pszType );5200 pHandleInfo->GrantedAccess, pHandleInfo->HandleAttributes, pszType, pHandleInfo->ObjectTypeIndex); 5111 5201 5112 5202 /* Try add the process name. */ -
trunk/src/VBox/HostDrivers/Support/win/SUPHardenedVerifyProcess-win.cpp
r96407 r97023 2486 2486 2487 2487 2488 #ifdef IN_RING3 2489 /** 2490 * Verifies that we don't have any inheritable handles around, other than a few 2491 * ones for file and event objects. 2492 * 2493 * When finding an inheritable handle of a different type, it will change it to 2494 * non-inhertiable. This must NOT be called in the final process prior to 2495 * opening the device! 2496 * 2497 * @returns VBox status code 2498 * @param pThis The process scanning state structure. 2499 */ 2500 static int supHardNtVpCheckHandles(PSUPHNTVPSTATE pThis) 2501 { 2502 SUP_DPRINTF(("supHardNtVpCheckHandles:\n")); 2503 2504 /* 2505 * Take a snapshot of all the handles in the system. 2506 * (Because the current process handle snapshot was added in Windows 8, 2507 * so we cannot use that yet.) 2508 */ 2509 uint32_t cbBuf = _256K; 2510 uint8_t *pbBuf = (uint8_t *)RTMemAlloc(cbBuf); 2511 ULONG cbNeeded = cbBuf; 2512 NTSTATUS rcNt = NtQuerySystemInformation(SystemExtendedHandleInformation, pbBuf, cbBuf, &cbNeeded); 2513 if (!NT_SUCCESS(rcNt)) 2514 { 2515 while ( rcNt == STATUS_INFO_LENGTH_MISMATCH 2516 && cbNeeded > cbBuf 2517 && cbBuf <= _32M) 2518 { 2519 cbBuf = RT_ALIGN_32(cbNeeded + _4K, _64K); 2520 RTMemFree(pbBuf); 2521 pbBuf = (uint8_t *)RTMemAlloc(cbBuf); 2522 if (!pbBuf) 2523 return supHardNtVpSetInfo2(pThis, VERR_SUP_VP_NO_MEMORY, "Failed to allocate %zu bytes querying handles.", cbBuf); 2524 rcNt = NtQuerySystemInformation(SystemExtendedHandleInformation, pbBuf, cbBuf, &cbNeeded); 2525 } 2526 if (!NT_SUCCESS(rcNt)) 2527 { 2528 RTMemFree(pbBuf); 2529 return supHardNtVpSetInfo2(pThis, VERR_SUP_VP_NO_MEMORY, "Failed to allocate %zu bytes querying handles.", cbBuf); 2530 } 2531 } 2532 2533 /* 2534 * Examine the snapshot for handles for this process. 2535 */ 2536 int rcRet = VINF_SUCCESS; 2537 HANDLE const idProcess = RTNtCurrentTeb()->ClientId.UniqueProcess; 2538 SYSTEM_HANDLE_INFORMATION_EX const *pInfo = (SYSTEM_HANDLE_INFORMATION_EX const *)pbBuf; 2539 ULONG_PTR i = pInfo->NumberOfHandles; 2540 AssertRelease(RT_UOFFSETOF_DYN(SYSTEM_HANDLE_INFORMATION_EX, Handles[i]) == cbNeeded); 2541 while (i-- > 0) 2542 { 2543 SYSTEM_HANDLE_ENTRY_INFO_EX const *pHandleInfo = &pInfo->Handles[i]; 2544 if ( (pHandleInfo->HandleAttributes & OBJ_INHERIT) 2545 && pHandleInfo->UniqueProcessId == idProcess) 2546 { 2547 ULONG cbNeeded2 = 0; 2548 rcNt = NtQueryObject(pHandleInfo->HandleValue, ObjectTypeInformation, 2549 pThis->abMemory, sizeof(pThis->abMemory), &cbNeeded2); 2550 if (NT_SUCCESS(rcNt)) 2551 { 2552 POBJECT_TYPE_INFORMATION pTypeInfo = (POBJECT_TYPE_INFORMATION)pThis->abMemory; 2553 if ( pTypeInfo->TypeName.Length == sizeof(L"File") - sizeof(wchar_t) 2554 && memcmp(pTypeInfo->TypeName.Buffer, L"File", sizeof(L"File") - sizeof(wchar_t)) == 0) 2555 SUP_DPRINTF(("supHardNtVpCheckHandles: Inheritable file handle: %p\n", pHandleInfo->HandleValue)); 2556 else if ( pTypeInfo->TypeName.Length == sizeof(L"Event") - sizeof(wchar_t) 2557 && memcmp(pTypeInfo->TypeName.Buffer, L"Event", sizeof(L"Event") - sizeof(wchar_t)) == 0) 2558 SUP_DPRINTF(("supHardNtVpCheckHandles: Inheritable event handle: %p\n", pHandleInfo->HandleValue)); 2559 else 2560 { 2561 OBJECT_HANDLE_FLAG_INFORMATION SetInfo; 2562 SetInfo.Inherit = FALSE; 2563 SetInfo.ProtectFromClose = FALSE; 2564 rcNt = NtSetInformationObject(pHandleInfo->HandleValue, ObjectHandleFlagInformation, 2565 &SetInfo, sizeof(SetInfo)); 2566 if (NT_SUCCESS(rcNt)) 2567 { 2568 SUP_DPRINTF(("supHardNtVpCheckHandles: Marked %ls handle non-inheritable: %p\n", 2569 pTypeInfo->TypeName.Buffer, pHandleInfo->HandleValue)); 2570 pThis->cFixes++; 2571 } 2572 else 2573 { 2574 rcRet = supHardNtVpSetInfo2(pThis, VERR_SUP_VP_SET_HANDLE_NOINHERIT, 2575 "NtSetInformationObject(%p,,,) -> %#x", pHandleInfo->HandleValue, rcNt); 2576 break; 2577 } 2578 } 2579 } 2580 else 2581 { 2582 rcRet = supHardNtVpSetInfo2(pThis, VERR_SUP_VP_QUERY_HANDLE_TYPE, 2583 "NtQueryObject(%p,,,,) -> %#x", pHandleInfo->HandleValue, rcNt); 2584 break; 2585 } 2586 2587 } 2588 } 2589 RTMemFree(pbBuf); 2590 return rcRet; 2591 } 2592 #endif /* IN_RING3 */ 2593 2594 2488 2595 /** 2489 2596 * Verifies the given process. … … 2549 2656 if (RT_SUCCESS(rc)) 2550 2657 rc = supHardNtVpCheckDlls(pThis); 2658 #ifdef IN_RING3 2659 if (enmKind == SUPHARDNTVPKIND_SELF_PURIFICATION_LIMITED) 2660 rc = supHardNtVpCheckHandles(pThis); 2661 #endif 2551 2662 2552 2663 if (pcFixes)
Note:
See TracChangeset
for help on using the changeset viewer.