VirtualBox

Changeset 97023 in vbox for trunk/src/VBox/HostDrivers


Ignore:
Timestamp:
Oct 6, 2022 8:23:59 AM (2 years ago)
Author:
vboxsync
svn:sync-xref-src-repo-rev:
153956
Message:

SUP: Check inherited handles in bugging VM processes. bugref:10294

Location:
trunk/src/VBox/HostDrivers/Support/win
Files:
2 edited

Legend:

Unmodified
Added
Removed
  • trunk/src/VBox/HostDrivers/Support/win/SUPDrv-win.cpp

    r96407 r97023  
    49434943
    49444944
     4945static const char *supdrvNtProtectHandleTypeIndexToName(ULONG idxType, char *pszName, size_t cbName)
     4946{
     4947    /*
     4948     * Query the object types.
     4949     */
     4950    uint32_t  cbBuf    = _8K;
     4951    uint8_t  *pbBuf    = (uint8_t *)RTMemAllocZ(_8K);
     4952    ULONG     cbNeeded = cbBuf;
     4953    NTSTATUS rcNt = NtQueryObject(NULL, ObjectTypesInformation, pbBuf, cbBuf, &cbNeeded);
     4954    while (rcNt == STATUS_INFO_LENGTH_MISMATCH)
     4955    {
     4956        cbBuf = RT_ALIGN_32(cbNeeded + 256, _64K);
     4957        RTMemFree(pbBuf);
     4958        pbBuf = (uint8_t *)RTMemAllocZ(cbBuf);
     4959        if (pbBuf)
     4960            rcNt = NtQueryObject(NULL, ObjectTypesInformation, pbBuf, cbBuf, &cbNeeded);
     4961        else
     4962            break;
     4963    }
     4964    if (NT_SUCCESS(rcNt))
     4965    {
     4966        Assert(cbNeeded <= cbBuf);
     4967
     4968        POBJECT_TYPES_INFORMATION pObjTypes = (OBJECT_TYPES_INFORMATION *)pbBuf;
     4969        POBJECT_TYPE_INFORMATION  pCurType  = &pObjTypes->FirstType;
     4970        ULONG cLeft = pObjTypes->NumberOfTypes;
     4971        while (cLeft-- > 0 && (uintptr_t)&pCurType[1] - (uintptr_t)pbBuf < cbNeeded)
     4972        {
     4973            if (pCurType->TypeIndex == idxType)
     4974            {
     4975                PCRTUTF16 const pwszSrc = pCurType->TypeName.Buffer;
     4976                AssertBreak(pwszSrc);
     4977                size_t          idxName = pCurType->TypeName.Length / sizeof(RTUTF16);
     4978                AssertBreak(idxName > 0);
     4979                AssertBreak(idxName < 128);
     4980                if (idxName >= cbName)
     4981                    idxName = cbName - 1;
     4982                pszName[idxName] = '\0';
     4983                while (idxName-- > 0)
     4984                    pszName[idxName] = (char )pwszSrc[idxName];
     4985                RTMemFree(pbBuf);
     4986                return pszName;
     4987            }
     4988
     4989            /* next */
     4990            pCurType = (POBJECT_TYPE_INFORMATION)(  (uintptr_t)pCurType->TypeName.Buffer
     4991                                                  + RT_ALIGN_32(pCurType->TypeName.MaximumLength, sizeof(uintptr_t)));
     4992        }
     4993    }
     4994
     4995    RTMemFree(pbBuf);
     4996    return "unknown";
     4997}
     4998
     4999
    49455000/**
    49465001 * Worker for supdrvNtProtectVerifyProcess that verifies the handles to a VM
     
    50095064    uint32_t cBenignThreadHandles  = 0;
    50105065
     5066    uint32_t cEvilInheritableHandles   = 0;
     5067    uint32_t cBenignInheritableHandles = 0;
     5068    char     szTmpName[32];
     5069
    50115070    SYSTEM_HANDLE_INFORMATION_EX const *pInfo = (SYSTEM_HANDLE_INFORMATION_EX const *)pbBuf;
    50125071    ULONG_PTR i = pInfo->NumberOfHandles;
     
    50705129            cEvilThreadHandles++;
    50715130            pszType = "thread";
     5131        }
     5132        else if (   (pHandleInfo->HandleAttributes & OBJ_INHERIT)
     5133                 && pHandleInfo->UniqueProcessId == hProtectedPid)
     5134        {
     5135            /* No handles should be marked inheritable, except files and two events.
     5136               Handles to NT 'directory' objects are especially evil, because of
     5137               KnownDlls faking. See bugref{10294} for details.
     5138
     5139               Correlating the ObjectTypeIndex to a type is complicated, so instead
     5140               we try referecing the handle and check the type that way.  So, only
     5141               file and events objects are allowed to be marked inheritable at the
     5142               moment. Add more in whitelist fashion if needed. */
     5143            void *pvObject = NULL;
     5144            rcNt = ObReferenceObjectByHandle(pHandleInfo->HandleValue, 0, *IoFileObjectType, KernelMode, &pvObject, NULL);
     5145            if (rcNt == STATUS_OBJECT_TYPE_MISMATCH)
     5146                rcNt = ObReferenceObjectByHandle(pHandleInfo->HandleValue, 0, *ExEventObjectType, KernelMode, &pvObject, NULL);
     5147            if (NT_SUCCESS(rcNt))
     5148            {
     5149                ObDereferenceObject(pvObject);
     5150                cBenignInheritableHandles++;
     5151                continue;
     5152            }
     5153
     5154            if (rcNt != STATUS_OBJECT_TYPE_MISMATCH)
     5155            {
     5156                cBenignInheritableHandles++;
     5157                continue;
     5158            }
     5159
     5160            cEvilInheritableHandles++;
     5161            pszType = supdrvNtProtectHandleTypeIndexToName(pHandleInfo->ObjectTypeIndex, szTmpName, sizeof(szTmpName));
    50725162        }
    50735163        else
     
    51005190            || g_pfnObRegisterCallbacks)
    51015191        {
    5102             LogRel(("vboxdrv: Found evil handle to budding VM process: pid=%p h=%p acc=%#x attr=%#x type=%s\n",
     5192            LogRel(("vboxdrv: Found evil handle to budding VM process: pid=%p h=%p acc=%#x attr=%#x type=%s (%u)\n",
    51035193                    pHandleInfo->UniqueProcessId, pHandleInfo->HandleValue,
    5104                     pHandleInfo->GrantedAccess, pHandleInfo->HandleAttributes, pszType));
     5194                    pHandleInfo->GrantedAccess, pHandleInfo->HandleAttributes, pszType, pHandleInfo->ObjectTypeIndex));
    51055195            rc = RTErrInfoAddF(pErrInfo, VERR_SUPDRV_HARDENING_EVIL_HANDLE,
    51065196                               *pErrInfo->pszMsg
    5107                                ? "\nFound evil handle to budding VM process: pid=%p h=%p acc=%#x attr=%#x type=%s"
    5108                                : "Found evil handle to budding VM process: pid=%p h=%p acc=%#x attr=%#x type=%s",
     5197                               ? "\nFound evil handle to budding VM process: pid=%p h=%p acc=%#x attr=%#x type=%s (%u)"
     5198                               : "Found evil handle to budding VM process: pid=%p h=%p acc=%#x attr=%#x type=%s (%u)",
    51095199                               pHandleInfo->UniqueProcessId, pHandleInfo->HandleValue,
    5110                                pHandleInfo->GrantedAccess, pHandleInfo->HandleAttributes, pszType);
     5200                               pHandleInfo->GrantedAccess, pHandleInfo->HandleAttributes, pszType, pHandleInfo->ObjectTypeIndex);
    51115201
    51125202            /* Try add the process name. */
  • trunk/src/VBox/HostDrivers/Support/win/SUPHardenedVerifyProcess-win.cpp

    r96407 r97023  
    24862486
    24872487
     2488#ifdef IN_RING3
     2489/**
     2490 * Verifies that we don't have any inheritable handles around, other than a few
     2491 * ones for file and event objects.
     2492 *
     2493 * When finding an inheritable handle of a different type, it will change it to
     2494 * non-inhertiable.  This must NOT be called in the final process prior to
     2495 * opening the device!
     2496 *
     2497 * @returns VBox status code
     2498 * @param   pThis               The process scanning state structure.
     2499 */
     2500static int supHardNtVpCheckHandles(PSUPHNTVPSTATE pThis)
     2501{
     2502    SUP_DPRINTF(("supHardNtVpCheckHandles:\n"));
     2503
     2504    /*
     2505     * Take a snapshot of all the handles in the system.
     2506     * (Because the current process handle snapshot was added in Windows 8,
     2507     * so we cannot use that yet.)
     2508     */
     2509    uint32_t    cbBuf    = _256K;
     2510    uint8_t    *pbBuf    = (uint8_t *)RTMemAlloc(cbBuf);
     2511    ULONG       cbNeeded = cbBuf;
     2512    NTSTATUS rcNt = NtQuerySystemInformation(SystemExtendedHandleInformation, pbBuf, cbBuf, &cbNeeded);
     2513    if (!NT_SUCCESS(rcNt))
     2514    {
     2515        while (   rcNt == STATUS_INFO_LENGTH_MISMATCH
     2516               && cbNeeded > cbBuf
     2517               && cbBuf <= _32M)
     2518        {
     2519            cbBuf = RT_ALIGN_32(cbNeeded + _4K, _64K);
     2520            RTMemFree(pbBuf);
     2521            pbBuf = (uint8_t *)RTMemAlloc(cbBuf);
     2522            if (!pbBuf)
     2523                return supHardNtVpSetInfo2(pThis, VERR_SUP_VP_NO_MEMORY, "Failed to allocate %zu bytes querying handles.", cbBuf);
     2524            rcNt = NtQuerySystemInformation(SystemExtendedHandleInformation, pbBuf, cbBuf, &cbNeeded);
     2525        }
     2526        if (!NT_SUCCESS(rcNt))
     2527        {
     2528            RTMemFree(pbBuf);
     2529            return supHardNtVpSetInfo2(pThis, VERR_SUP_VP_NO_MEMORY, "Failed to allocate %zu bytes querying handles.", cbBuf);
     2530        }
     2531    }
     2532
     2533    /*
     2534     * Examine the snapshot for handles for this process.
     2535     */
     2536    int                                 rcRet     = VINF_SUCCESS;
     2537    HANDLE const                        idProcess = RTNtCurrentTeb()->ClientId.UniqueProcess;
     2538    SYSTEM_HANDLE_INFORMATION_EX const *pInfo     = (SYSTEM_HANDLE_INFORMATION_EX const *)pbBuf;
     2539    ULONG_PTR                           i         = pInfo->NumberOfHandles;
     2540    AssertRelease(RT_UOFFSETOF_DYN(SYSTEM_HANDLE_INFORMATION_EX, Handles[i]) == cbNeeded);
     2541    while (i-- > 0)
     2542    {
     2543        SYSTEM_HANDLE_ENTRY_INFO_EX const *pHandleInfo = &pInfo->Handles[i];
     2544        if (   (pHandleInfo->HandleAttributes & OBJ_INHERIT)
     2545            && pHandleInfo->UniqueProcessId == idProcess)
     2546        {
     2547            ULONG cbNeeded2 = 0;
     2548            rcNt = NtQueryObject(pHandleInfo->HandleValue, ObjectTypeInformation,
     2549                                 pThis->abMemory, sizeof(pThis->abMemory), &cbNeeded2);
     2550            if (NT_SUCCESS(rcNt))
     2551            {
     2552                POBJECT_TYPE_INFORMATION pTypeInfo = (POBJECT_TYPE_INFORMATION)pThis->abMemory;
     2553                if (   pTypeInfo->TypeName.Length == sizeof(L"File") - sizeof(wchar_t)
     2554                    && memcmp(pTypeInfo->TypeName.Buffer, L"File", sizeof(L"File") - sizeof(wchar_t)) == 0)
     2555                    SUP_DPRINTF(("supHardNtVpCheckHandles: Inheritable file handle: %p\n", pHandleInfo->HandleValue));
     2556                else if (   pTypeInfo->TypeName.Length == sizeof(L"Event") - sizeof(wchar_t)
     2557                         && memcmp(pTypeInfo->TypeName.Buffer, L"Event", sizeof(L"Event") - sizeof(wchar_t)) == 0)
     2558                    SUP_DPRINTF(("supHardNtVpCheckHandles: Inheritable event handle: %p\n", pHandleInfo->HandleValue));
     2559                else
     2560                {
     2561                    OBJECT_HANDLE_FLAG_INFORMATION SetInfo;
     2562                    SetInfo.Inherit = FALSE;
     2563                    SetInfo.ProtectFromClose = FALSE;
     2564                    rcNt = NtSetInformationObject(pHandleInfo->HandleValue, ObjectHandleFlagInformation,
     2565                                                  &SetInfo, sizeof(SetInfo));
     2566                    if (NT_SUCCESS(rcNt))
     2567                    {
     2568                        SUP_DPRINTF(("supHardNtVpCheckHandles: Marked %ls handle non-inheritable: %p\n",
     2569                                     pTypeInfo->TypeName.Buffer, pHandleInfo->HandleValue));
     2570                        pThis->cFixes++;
     2571                    }
     2572                    else
     2573                    {
     2574                        rcRet = supHardNtVpSetInfo2(pThis, VERR_SUP_VP_SET_HANDLE_NOINHERIT,
     2575                                                    "NtSetInformationObject(%p,,,) -> %#x", pHandleInfo->HandleValue, rcNt);
     2576                        break;
     2577                    }
     2578                }
     2579            }
     2580            else
     2581            {
     2582                rcRet = supHardNtVpSetInfo2(pThis, VERR_SUP_VP_QUERY_HANDLE_TYPE,
     2583                                            "NtQueryObject(%p,,,,) -> %#x", pHandleInfo->HandleValue, rcNt);
     2584                break;
     2585            }
     2586
     2587        }
     2588    }
     2589    RTMemFree(pbBuf);
     2590    return rcRet;
     2591}
     2592#endif /* IN_RING3 */
     2593
     2594
    24882595/**
    24892596 * Verifies the given process.
     
    25492656            if (RT_SUCCESS(rc))
    25502657                rc = supHardNtVpCheckDlls(pThis);
     2658#ifdef IN_RING3
     2659            if (enmKind == SUPHARDNTVPKIND_SELF_PURIFICATION_LIMITED)
     2660                rc = supHardNtVpCheckHandles(pThis);
     2661#endif
    25512662
    25522663            if (pcFixes)
Note: See TracChangeset for help on using the changeset viewer.

© 2025 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette