www.threatcode.com

If an application is written for TODAY's Windows XP logo it will run as a non administrator.

Everyone right now.. go click on your time and date... go .. okay ..can you change the date and time?
That is the quick and dirty test to see if you have admin rights...

You have administrator rights to your machine. Now go over to the absolutely stupid-est user in the office. (If that's you... that's fine ;-) Do they have admin rights just like you? The one that will click and download anything? That means not only can "you" install anything you darn well please. so can they.

And if you do and they do.. so do all those lovely drive by browser 'sploits and stuff. Please go back and review the security bulletins and see all the ones these days that say "will gain access in the rights of the user context" ...that means if you are LUA (non admin) so are the nasties... and studies have shown that if you run as non admin (which ...hello people.. Vista is doing this along with 'nix and mac's so get used to it before Vista's admin isn't admin anymore) you get less malware. So why aren't we doing what we can to lower the attack surface of what we have ... especially when we can't rip out IE as our .. yeah you guessed it... crappy line of business applications depend on it? Why is it that according to stats that about 80% of us are running as admin? Yeah I know it's 'cause it's easy and it's the way we've always done it about Windows...but why are we still doing it this way?

Does the stupid-est user in the office really need to be able to download malware-de-jour?

So how do you run as non admin? Log into that system, add another user as a 'normal' user and log in with those 'normal user' rights.
Okay how many applications of your won't work?

Lemme guess.. beancounter ones (accounting software)... along with many line of business applications.
So how do you deal with applications that won't 'do LUA'?

Aaron's blog has some suggestions..

Aaron Margosis' WebLog : Fixing "LUA bugs", Part I:
http://blogs.msdn.com/aaron_margosis/archive/2006/02/16/533077.aspx

Aaron Margosis' WebLog : Fixing "LUA Bugs", Part II:
http://blogs.msdn.com/aaron_margosis/archive/2006/03/27/562091.aspx

Jesper's Blog : Malware and administrative rights:
http://blogs.technet.com/jesper_johansson/archive/2005/11/30/415328.aspx

Use filemon/sysmon to figure out the ACL issues....

Use RunAs.

http://www.microsoft.com/emea/itsshowtime/sessionh.aspx?videoid=102

Want to really fix it though? Yell. Yell at those vendors to fix it. And make sure your folks that are making the purchasing decisions know that this needs to be a requirement...because in this day and age of computer technology there is NO EXCUSE for a vendor to code like we are running Windows 98 around this place.

As to restricting Active X to only those you need..harness the power of group policy on that one... Outlook Web Access and Small Business Server Remote Web Workplace do not function if XP Service Pack 2 Add-on Blocking is enabled via group policy:
http://support.microsoft.com/kb/555235/en-us
How to manage Internet Explorer add-ons in Windows XP Service Pack 2:
http://support.microsoft.com/?id=883256

How's that Milos?

Milos Puchta wrote:

Susan,

give please more info instead of clipped style letter.
It would be nice if you cold give it a little more time
to educate those who can accept it. ( For those who
feel lost without being administrator there are at
least two tools that change the rights ....)

TIA
Rgds
Milos



----- Original Message ----- From: "Susan Bradley, CPA aka Ebitz - SBS Rocks [MVP]" <[EMAIL PROTECTED]>
To: "bkfsec" <[EMAIL PROTECTED]>
Cc: "Murad Talukdar" <[EMAIL PROTECTED]>; <[email protected]>
Sent: Saturday, April 01, 2006 1:07 AM
Subject: Re: New IE flaw and exploit sites/migration to non-MS browser


How many of you are running as non admin? Used the Group policy to adjust and allow approved active X?

Now I'm no coder...but from threads I've seen.... Firefox's Extensions are ripe for fun and excitement.

Is it IE that's insecure? Or how the workstations are setup in the first place?


bkfsec wrote:

Murad Talukdar wrote:

On a related note--how many people have initiated a move away from IE to Firefox/Opera etc in a corporate environment, due to the perception(is it JUST a perception or reality based?) that IE is less secure/more prone to
exploits?


We have in certain areas. It's very much reality-based that IE is less secure and more prone to exploit than other browsers, for a number of reasons, not the least of which is IE's architectural tie-in with the MS Windows operating system.

            -bkfsec



---------------------------------------------------------------------------

---------------------------------------------------------------------------




--
Letting your vendors set your risk analysis these days? http://www.threatcode.com


--------------------------------------------------------------------------- ---------------------------------------------------------------------------






--
Letting your vendors set your risk analysis these days? http://www.threatcode.com


---------------------------------------------------------------------------
---------------------------------------------------------------------------

Reply via email to