90% of Microsoft Windows 7 Vulnerabilities are Mitigated by Eliminating Admin Rights

Soldato
Joined
17 Jan 2007
Posts
8,944
Location
Manchester
I've had to chop the word "critical" out of the title, so apologies for that.

I’m pretty sure I recall a previous version of this report floating around but this is the latest release and I thought I’d post it for anyone interested. I’m not expecting it to sway the naysayers but maybe those on the fence or new to the concept might be persuaded. I tend to think that people find computer security either really interesting or not interesting at all.

You can have a read of the report here:

BeyondTrust2009 Microsoft Vulnerability Analysis

Or just the executive summary below, truncated slightly:

Executive Summary

Microsoft and their partners regularly identify new security vulnerabilities in Microsoft software. In 2009 Microsoft published nearly 75 security bulletins documenting and providing patches for nearly 200 vulnerabilities. By examining all of the published Microsoft vulnerabilities in 2009 and all of the published Windows 7 vulnerabilities to date, this report quantifies the continued effectiveness of removing administrator rights at mitigating vulnerabilities in Microsoft software.

Key findings from this report show that removing administrator rights will better protect companies against the exploitation of:

• 90% of Critical Windows 7 vulnerabilities reported to date
• 100% of Microsoft Office vulnerabilities reported in 2009
• 94% of Internet Explorer and 100% of IE 8 vulnerabilities reported in 2009
• 64% of all Microsoft vulnerabilities reported in 2009

Microsoft is to be lauded for releasing patches to known vulnerabilities each month. However, vulnerabilities take time to identify and patches take time to apply. During this period, threats can damage a corporate network and gain access to sensitive information. It is important that companies follow general best practices to improve security.

Note that although it says 2009 on the report some of the security bulletins sampled are as recent as March 2010. Don't say Pwn2Own. ;)

On the flip side understand that running as a standard user is not a cure-all; software updates and a whole range of other factors contribute to the "defense in depth" approach, of which least privilege is just one.

So there you go, no news really. At least you have some reading fodder that will send you to sleep. :p
 
Thanks, interesting reading :)

It's tempting to cite Linux's user model here, and how even newbies are aware of the 'all powerful root' and even if they don't know why, they know not to use it as a day-to-day work account. MS in comparison seem to have only recently gone down this path of moving away from open Admin account usage e.g good setup under default installation using reduced privileges. Things are getting better though at least :)

Still you can do enough damage under a standard user account anyway half the time :p Windows Integrity Levels and Sandboxed environments seem quite nice to help with this, maybe these will become more ubiquitous in time.
 
Firewizard made an excellent thread about this a while ago. I certainly only run my computer as a standard user these days as, for day to day usage, there's no real need to have admin privileges.
 
I formatted my main few days ago PC, and when next there I plan to set up an additional account using Standard User for daily purposes. WIth the intention of trying to form a habbit of using it always.

Not read the link, but do you have to password your UAC main account? As it would be handy to eliminate one step of having to type password if need to run as admin.
 
Running as a standard user which means anything executing as you also has limited privileges is one of the most basic steps of securing a system. All though, as Theheyes mentioned, it is certainly not a cure-all of everything. Security is about having multiple layers of defenses. Least privilege access is only one, certainly one of the most important ones, though.

Running as a standard user doesn't protect what is arguably the most important to the user though; their data. If malware infects your system, providing it isn't written assuming it will have administrator rights and will actually work running as a standard user, then it will have access to all of the data which you have stored in that account. Having said that though, running as a standard user isn't about protecting your data, but the configuration of the system and other user accounts.

----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

I formatted my main few days ago PC, and when next there I plan to set up an additional account using Standard User for daily purposes. WIth the intention of trying to form a habbit of using it always.

Not read the link, but do you have to password your UAC main account? As it would be handy to eliminate one step of having to type password if need to run as admin.

If you are referring to the administrator account, then yes, it's best to password protect it.

Please be aware of something regarding elevating from a standard user account though, when you need to do something which requires administrator rights, you will receive the Over The Shoulder elevation dialog which will ask you to enter the credentials of the administrator account. It's possible for malware to intercept the Over The Shoulder elevation dialog and gain the administrator credentials and then go on and infect the administrator account.

Mark Russinovich said:
Even though elevation dialogs appear on a separate secure desktop, users have no way by default of verifying that they are viewing a legitimate dialog and not one presented by malware. That isn’t an issue for AAM because malware can’t gain administrative rights with a faked Consent dialog, but malware could wait for a standard user’s OTS elevation, intercept it, and use a Trojan horse dialog to capture administrator credentials. With those credentials they can gain access to the administrator’s account and infect it.

For this reason, OTS elevations are strongly discouraged in corporate environments. To disable OTS elevations (and reduce help desk calls), run the Local Security Policy Editor (Secpol.msc) and configure "User Account Control: Behavior of the elevation prompt for standard users" to "Automatically deny elevation requests."

Home users who are security-conscious should configure the OTS elevations to require a Secure Attention Sequence (SAS) that malware cannot intercept or simulate. Configure SAS by running the Group Policy Editor (Gpedit.msc), navigating to Computer Configuration | Administrative Templates | Windows Components | Credential User Interface, and enabling "Require trusted path for credential entry." After doing so you will be required to enter Ctrl+Alt+Delete to access the elevation dialog.

Inside Windows Vista User Account Control - Mark Russinovich

Mark Russinovich actually demonstrates this in his Windows Security Boundaries talk, at around about the 1:03 point.

You can enable the Secure Attention Sequence to make elevating from a standard user account safer, as Mark mentions above. However, I'm not sure if this can be done if you're using versions of Windows Vista or Windows 7 which don't have access to the Group Policy Editor; Home Premium and below. If you don't have one of the versions which have access to the Group Policy Editor, it's possible that you can enable the Secure Attention Sequence from the registry. All though, I can't quite find the correct key.

It's also perfectly possible for malware to gain administrator rights by compromising an elevated process due to the shared state of processes running with standard user rights and those running with administrator rights, as it is when you are running in Administrative Approval Mode. All though, it is more difficult for malware to gain administrator rights by compromising an elevated process if you are running as a standard user as opposed to running as a Protected Administrator i.e. in Administrator Approval Mode.

Mark Russinovich said:
Elevated AAM processes are especially susceptible to compromise because they run in the same user account as the AAM user’s standard-rights processes and share the user’s profile. Many applications read settings and load extensions registered in a user’s profile, offering opportunities for malware to elevate. For example, the common control dialogs load Shell extensions configured in a user’s registry key (under HKEY_CURRENT_USER), so malware can add itself as an extension to load into any elevated process that uses those dialogs.

Even processes elevated from standard user accounts can conceivably be compromised because of shared state. All the processes running in a logon session share the internal namespace where Windows stores objects such as events, mutexes, semaphores, and shared memory. If malware knows that an elevated process will try to open and read a specific shared memory object when the process starts, it could create the object with contents that trigger a buffer overflow to inject code into the elevated process. That type of attack is relatively sophisticated, but its possibility prevents OTS elevations from being a security boundary.

Inside Windows Vista User Account Control - Mark Russinovich

This is not some kind of massive vulnerability in the User Account Control design though. When ever you elevate, you are introducing a security risk to the system. Elevating is purely a convenience for the user, nothing to do with security. If you truly want a secure environment to do administrative operations, you are going to need to switch to a dedicated account which hopefully won't be infected with malware. If you are someone who switches to a dedicated administrator account to perform administrative operations, then you may as well disable the elevation dialogs entirely for administrators. You can do this by navigating to the following registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System and finding the following value name "ConsentPromptBehaviorAdmin" which should be second to top. If you then double click on it and set the "Value data:" to "0". Once you have done this, when you need to do any operations which require administrator rights, instead of receiving the consent elevation dialog and having to click "Yes", the operation will automatically be granted administrator rights.

Jim Allchin said:
The true test of how secure any system will be in practice has as much to do with how it is deployed as it does with its architecture and code quality. And how the system is deployed has a lot to do with usability and convenience. (If you don’t lock your doors at night because it is too much of a hassle, the locks don't offer much security.) Our goal is that the most generally applicable security configuration (remember, this is a combination of architecture, code quality and usability) is deployed by default. We sometimes use defense-in-depth approaches when designing security measures instead of hard boundaries for this reason. We also know that there are certain customers who, even with a deep understanding of the usability issues, may choose to enable a more locked down system than we could ever ship by default. For these people, we provide great flexibility to turn on even more protections. What makes this even more complex is that given how broadly a product like Windows Vista will be used, some people may try to create sensationalist headlines by calling out some apparent "weakness." Before they do, it is important to remember that the design was more likely a deliberate design choice that was balancing some other factor such as usability or application compatibility, rather than an oversight.

Security Features vs. Convenience - Jim Allchin

Im sure we have all come across some of *those* articles at some point. :p
 
It's tempting to cite Linux's user model here, and how even newbies are aware of the 'all powerful root' and even if they don't know why, they know not to use it as a day-to-day work account. MS in comparison seem to have only recently gone down this path of moving away from open Admin account usage e.g good setup under default installation using reduced privileges. Things are getting better though at least.

This is my experience also. In any kind of formal Linux tuition I’ve had it is pretty much the first thing they tell you. I even think it would be fair to say that anyone caught using a root account for everyday stuff would be perceived as a bit of a newbie. The added danger with Linux though is one wrong switch on the command line and you bork the whole system without so much as a confirmation box. :p

I have to run as Administrator or AutoCAD won't work!!

This is a big spanner in the works for a lot of people trying to implement least user privileges, especially in the workplace. Hopefully with the Windows model the way it is now these problems will slowly fade away. Unfortunately in my own experience I’m seeing software still not complying even though it was written in the last couple of years.

I formatted my main few days ago PC, and when next there I plan to set up an additional account using Standard User for daily purposes. WIth the intention of trying to form a habbit of using it always.

Not read the link, but do you have to password your UAC main account? As it would be handy to eliminate one step of having to type password if need to run as admin.

This is what I do. The user account created on install is left as the admin account, and I just create myself a new standard one. I do the bulk of the installs, stuff like flash player and adobe reader and also set the backup, within the admin account as you will be getting a lot of UAC prompts. After that using a standard account is pretty easy for me. In answer to your question I would always have a decent administrator account password.
 
I run my PCs 100% of thje time with admin accounts.

I have never run as a user --- ever! - ok, yes, I do with my Linux PC, but never with Windows.

I regularly frequent some really sad sicko sites, and never do I get virus or spyware infections.

I use Avast, and I have the firewall that windows gives me and the firewall in my router but nothing else.

My EMails go through gmail also, for their filters.

I often wonder how its possible that anyone can get infected these days?
 
HA lol, no of course... I meant it in a humorous way

I deal with these ***** every day.

I still wonder how its possible to be that stupid though.

People I know have owned PCs for years and they are still every bit as thick as the first day they used it... Its as if they learn nothing at all... It baffles me to buggery.

Star swearies!!!

Sorry!
 
Last edited:
To be fair it's the ones that do supposedly work in IT that boggle the mind the most sometimes, like when you find MS Office installed on a domain controller. :o
 
I run my PCs 100% of thje time with admin accounts.

I regularly frequent some really sad sicko sites, and never do I get virus or spyware infections.

I use Avast, and I have the firewall that windows gives me and the firewall in my router but nothing else.

I often wonder how its possible that anyone can get infected these days?

Since you don't seem to be concerned about malware, may I ask why you run anti-virus software? If you are concerned about malware a little that you install anti-virus software (ignoring the whole debate regarding their value for the moment), running as an administrator seems rather self-defeating since the malware will simply be able to change the security configuration of your system, disable your anti-virus software and your firewall.

I deal with these ***** every day.

I still wonder how its possible to be that stupid though.

That's a bit harsh, in my opinion. I wouldn't say it's always down to pure stupidity as to why people get infected but simply because they are uneducated with regards to the risks of some of the things they do. If the user isn't being educated regarding computer security, then it doesn't matter if the operating system which they are using is extremely secure technically, theres always going to be problems.
 
Since you don't seem to be concerned about malware, may I ask why you run anti-virus software? If you are concerned about malware a little that you install anti-virus software (ignoring the whole debate regarding their value for the moment), running as an administrator seems rather self-defeating since the malware will simply be able to change the security configuration of your system, disable your anti-virus software and your firewall.

No no no.. I am very concerned with Malware.

The thing is, that I use NoAdware 4 ( Recently upgraded to v5 ) and through nearly all of last year, I found such a small amount of spyware that I actually stopped using it. I occasionally install it just to make sure but it finds only one or two items and even then they are never serious.

So, I am concerned, but I never seem get anything to make me worried enough anymore. Maybe its down to luck ,I dont know, but I just dont seem to be infected by anything anymore?

I agree with the idea that it is self defeating, but I have always reinstalled Windows every 3 to 6 months ( Sometimes for no fair reason, sometimes for a laugh ) so the thought that some malware might wreck my system really is one that

A - I have never had to face up to
Although its often fairly simple enough to repair

B - I truthfully dont worry about at all!
Although I should have course.


That's a bit harsh, in my opinion. I wouldn't say it's always down to pure stupidity as to why people get infected but simply because they are uneducated with regards to the risks of some of the things they do. If the user isn't being educated regarding computer security, then it doesn't matter if the operating system which they are using is extremely secure technically, theres always going to be problems.


Ok perhaps it is harsh for the main stock of people cattle. I should not judge all the flock by teh actions of the few.

Im thinking of one particular customer here, that lets paranoia rule her every move. She keeps reading up in Magazines, and on the internet about this or that new anti spyware or anti virus, and she goes off and installs it.

The second to last time I went to sort her PC out, it was because her PC was too slow to use. I found pretty much every single A/V that I knew of all installed and all chugging away. The whole PC was dead as a dodo and took me almost a halfhour in taskman just stopping enough services to make it responsive enough to kill off some of these malware apps through add-remove and most of them failed to uninstall and had to be killed off by hand... It would have been so much easier to just F&R

Now, the thing is, that she seems to be the one that everyone else in her bridge club seem to follow, and so what happens? - everyone of her friends follow her blindly and then its up to fatty here to go sort them out too!

Now, I said second to last because I told her that she must only use one A/V and while she can get away with more than one AntiSpyware app,. I would not suggest it, and only use one of each, but she still went ahead and put them all back on because she felt I was wrong.

So, the last time I went round, I never bothered and have not bothered since - even though the guy who went round the last time charged her £400 and apart from that being a total rip off, it never fixed her issues ( Not surprised )

So, its people like her that really make my blood boil, and there are loads of them around here... LOADS!
 
Back
Top Bottom