{"id":100145,"date":"2018-11-06T07:00:00","date_gmt":"2018-11-06T22:00:00","guid":{"rendered":"https:\/\/blogs.msdn.microsoft.com\/oldnewthing\/?p=100145"},"modified":"2019-03-13T00:13:49","modified_gmt":"2019-03-13T07:13:49","slug":"20181106-00","status":"publish","type":"post","link":"https:\/\/devblogs.microsoft.com\/oldnewthing\/20181106-00\/?p=100145","title":{"rendered":"Dubious security vulnerability: A program that adds a user to the Administrators group in the usual way"},"content":{"rendered":"<p>A security vulnerability report indicated that Windows was vulnerable to having a user added to the Administrators group. The finder attached a program demonstrating the issue. (To make things more exciting, they characterized the program as &#8220;malicious&#8221; and the person running it as an &#8220;attacker&#8221;.) <\/p>\n<p>The finder didn&#8217;t include source code, but the program was small enough that it could be reverse-compiled without too much difficulty. The program employs the usual mechanisms for adding a user to the Administrators group. Nothing particularly fancy. Just calling documented functions in documented ways to accomplish the documented effect. When you run the program as a standard user, it fails with <i>Access denied<\/i>, as expected. Only if you run it as an administrator does it succeed in adding a user to the Administrators group. <\/p>\n<p>Which is as things should be. <\/p>\n<p>There didn&#8217;t appear to be anything unusual going on here. No security boundary was crossed. Nothing suspicious happened. <\/p>\n<p>The finder explained that this program, when run elevated, adds a user to the Administrators group, and no anti-malware program flagged it as suspicious. <\/p>\n<p>Well yeah, because it&#8217;s not suspicious. It does something perfectly legitimate, via perfectly legitimate means, and it doesn&#8217;t attempt to subvert any security measures. Indeed, this is the sort of quick little program that you might see in a system administrator&#8217;s toolbox. <\/p>\n<p>It&#8217;s expected that a program which does nothing suspicious is not flagged as suspicious. <\/p>\n<p><b>Bonus reading<\/b>: <a HREF=\"https:\/\/blogs.technet.microsoft.com\/rhalbheer\/2011\/06\/16\/ten-immutable-laws-of-security-version-2-0\/\">The Ten Immutable Laws of Security (Version 2.0)<\/a>, specifically law #1: If a bad guy can persuade you to run his program on your computer, it&#8217;s not solely your computer anymore. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is a perfectly legitimate program.<\/p>\n","protected":false},"author":1069,"featured_media":111744,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[25],"class_list":["post-100145","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-oldnewthing","tag-code"],"acf":[],"blog_post_summary":"<p>This is a perfectly legitimate program.<\/p>\n","_links":{"self":[{"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/posts\/100145","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/users\/1069"}],"replies":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/comments?post=100145"}],"version-history":[{"count":0,"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/posts\/100145\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/media\/111744"}],"wp:attachment":[{"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/media?parent=100145"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/categories?post=100145"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/oldnewthing\/wp-json\/wp\/v2\/tags?post=100145"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}