Author Topic: Too many rights  (Read 6096 times)

0 Members and 1 Guest are viewing this topic.

Blauvogel

  • Guest
Too many rights
« on: March 21, 2006, 11:40:52 PM »
The German computer magazine c't has make a test of anti virus programs. They find out, that many programs have too many rights in the file system, so that unprivileged users can delete the hole anti virus software. Avast is also affected. Here are the message: http://www.heise.de/newsticker/meldung/71081 (german)

What says Alwil to that?

Offline Lisandro

  • Avast team
  • Certainly Bot
  • *
  • Posts: 67194
Re: Too many rights
« Reply #1 on: March 21, 2006, 11:43:24 PM »
What says Alwil to that?
Nothing. It's a Windows problem. The Administrator is the system God... He can do almost everything, hurts himself included...
You can use Drop-my-rights application to reduce the possibility of doing wrong things.

Anyway, welcome to forums  8)
The best things in life are free.

Offline DavidR

  • Avast Überevangelist
  • Certainly Bot
  • *****
  • Posts: 89029
  • No support PMs thanks
Re: Too many rights
« Reply #2 on: March 22, 2006, 12:04:34 AM »
If this is about secunia's advisory: http://secunia.com/advisories/19284/
Quote
   
Less critical
Impact:    Security Bypass
Manipulation of data Privilege escalation

Then yes it does effect avast, they are aware of it and it should be resolved in the next program update, there is also a thread about it with a work around until the program update at http://forum.avast.com/index.php?topic=19862.0.
Windows 10 Home 64bit/ Acer Aspire F15/ Intel Core i5 7200U 2.5GHz, 8GB DDR4 memory, 256GB SSD, 1TB HDD/ avast! free 24.3.6108 (build 24.3.8975.762) UI 1.0.801/ Firefox, uBlock Origin, uMatrix/ MailWasher Pro/ Avast! Mobile Security

justin1278

  • Guest
Re: Too many rights
« Reply #3 on: March 22, 2006, 12:06:44 AM »
Hi,

Here is the entire article translated into English. I used Babel Fish


Too many rights at anti-virus software Various virus scanners permit execution reef to everyone to the installation listings, update files or individual files, how analyses resulted in c't. Thus the virus scanners of reduced users can be deleted, programs could with higher rights be implemented or updates blocked.

By the problem different anti-virus products are concerned in different developments. Large parts of the program directory can manipulate reduced users in Pandas Platinum 2006 InterNet Security, trend Micros PC Cillin 14, McAfee and Avast at will. Up to the McAfee scanner these anti-virus products can be deleted by users with reduced accounts so far that they are no longer functional.

In GDatas anti-virus kits 2006 are accessible the update files for everyone. With f-Secures InterNet Security Suite is freely accessible the Unterordner backweb\4476822\Users, to Norton permits the execution reef on the Firewall rules, the intrusion Detection attitudes and the files LocationMap.dat as well as Validate.dat. CAs EzTrust releases the listing ArcTemp, Grisofts AVG individual files.

Some the scanner permit it to implement transferred code with administrator or system rights. An aggressor would have in addition only an existing file, which is called by the virus scanner service with system rights, with which to own harming software overwrites. GDatas anti-virus kit could be cut off by updates.

Some of c't informed manufacturer reacted already with product actualizations. AVG was already repaired by the Grisoft developers two weeks ago. Panda made a new version available of the software to the Download - at a normal software update it succeeded in a short test however still to take the scanner with the deletion of over 100 files as reduced users from the program directory out of operation. Panda users should download and install therefore the new Installer from the net, since that the update is obviously not delivered over the integrated mechanism.

Trend Micro works on an update, which is still located at present. The version PC Cillin 14,1 is to then contain nose-fixed. GData wants to shortly introduce a new update mechanism, which gets along without execution reef on the update files. Symantec does not permit the deletion of the files - the files disappear first in the Explorer, update one the opinion however, are again present the files. Several anti-virus producers did not react yet to the inquiries. Other virus scanners from the c't Virenscannertest in the number 26/05 like Antivir, Bitdefender, Ikarus, Kaspersky, NOD32 and Norman are not affected by the problem (dmk/c't)

Page 2:

ENUM Telefondomains to the Authentifzierung suggested by users


ENUM Domains could be used also to the Authentifizierung of a Gegenuebers in the net. Already now, Alexander Mayrhofer said the largest expenditure of the Austrian ENUM Registry ENUM.at, places validating a request with the registration of the ENUM Domains. The experts thought for many years appropriate validating procedures, in order to follow the editions of the national telephone adjusters. Also ENUM Domains the called telephone number Domains goes into Germany starting from April into the effect enterprise. Users can let their normal fixed net and portable radio numbers as well as a number of further call numbers register then like 0700 or 032 than InterNet Domains. The Domain in the style of 0.0.3.2.5.3.5.1.1.5 (thereby the German ENUM Domain 9.4.e164.arpa, 9.4 is attached always corresponds thereby to the reverse international telephone preselection) permits also a Routing of discussions over the InterNet, as far as a SIP service is furnished.

Mayrhofers suggestion taken up when meeting the Internet Engineering Task Force (IETF), as it says, "with interest". As is the case for a number of further new ideas to Telefondomains the gaining significance has the IETF working group however not yet finally decided whether one wants to take up Mayrhofers suggestion.

"the idea of the suggestion is," communicated Mayrhofer of the current IETF meeting in Dallas on request of heise on-line, "a pair of keys with the ENUM Domain, i.e. with a telephone number to connect. The secret part of the key for example is in the application of the user, the public part is deposited in the ENUM Domain." The owner of the number can mark with the private key, which is accessible only to him. The receiver opens with the public key and has by the fact the certainty that he has to actually do it with the owner of the mentioned number. The advantage of the procedure is for Mayrhofer in the fact that no previous key exchange is necessary - the receiver can get the public key "over the telephone number simply from the ENUM DNS".

It concerns a first version of the idea, grants Mayrhofer. Above all the key technology - the Domainkeys technology presented in an own working group of Sendmail boss Eric Allman and Cisco representative Jim Fenton as anti-Spam method -, suggested first by him, must be replaced probably rather by another, since Domainkeys was built very particularly on a targeted application. The topic "identification" stands however with until Friday the lasting developer meeting completely obviously highly in the course. A Kick off meeting - tituliert with the IETF as "Birds OF Feather" meeting - is concerned today with identification solutions in the net. The developers discussed already in the apron violently whether one needs such digital Identity Exchange Group (DIX).

In view of the ideas of application of EN around sprouting from the soil some experts wind themselves and warn of it that ENUM could likewise out banks like the different working groups about SIP (session Intitiation Protocol), basis minutes for Voice over IP. Peter Koch, ENUM-Experte with the DENIC, warned in Dallas about of the fact that a next to each other of always new, so-called NAPTR entries, which register addresses and ways to different applications in the DNS could bring sometime problems with itself: "as soon as the services are actually parallel used, are not sufficient the UDP package size despite EDNSO (Extended DNS), particularly some of these services quite many text datas in the NAPTR accommodate sometime", are afraid cook. A new EN around calendar function and a Instant Messaging suggestion were a little zoegerlich taken up therefore.

Controversy gave finally it in the working group also around a central suggestion on the rapid introduction to a Domain for the in such a way specified carrier EN around. Carrier EN around rapidly the Routing problem between VoIP offerers is to solve, who are dependent on private Peering or the VoIP Peering platforms started by some offerers without central Routing data base, in order to avoid expensive "detours" of their Traffics over classical Telco nets. _ Austria pioneer urge on,to wait not for the introduction of a new Domain under arpa. That would last, said much to for a long time Richard Stastny of the Telekom Austria daughter OEFEG.

One can a Domain a new carrier ENUM Domain concern (approximately E164i.arpa), should however very rapidly below the existing national EN around zones furnish - in the style of carrier.e164.arpa. The latter would essentially be a national decision, which took part with questions of supervision of EN around internationally Telecommunication union (International Telecommunication Union) had if necessary is informed. Even if many not behage knew the nesting, countries, which want to undertake something, so that begin something, EN around expert Lawrence Conroy means. One of the two bosses of the group of EN reworking, new star representative Richard Shockey, tried however, to sweep this "quick and dirty" suggestion from the table to. Richard Stastny according to one tries to agree now in such a way that both paths can be parallel taken nevertheless. (Monika Ermert)/(ssu/c't)
« Last Edit: March 22, 2006, 12:09:50 AM by justin1278 »

Blauvogel

  • Guest
Re: Too many rights
« Reply #4 on: March 22, 2006, 09:10:28 AM »
What says Alwil to that?
Nothing. It's a Windows problem.

No it is not! The program files directory has restricted rights. Only Administrator and SYSTEM have full rights. User can read only. And rights are inherited in NTFS. So all directories below program files must have the same rights. But the directory Alwil Software is full open - everybody has full rights! This can only be a result of the installation procedure of Avast. So Alwil Software must say why!

Offline Lisandro

  • Avast team
  • Certainly Bot
  • *
  • Posts: 67194
Re: Too many rights
« Reply #5 on: March 22, 2006, 12:33:13 PM »
But the directory Alwil Software is full open - everybody has full rights! This can only be a result of the installation procedure of Avast. So Alwil Software must say why!
Sorry, I've misunderstood you. The problem is only on avast installation folder.
You're right, this is a known issue that will be corrected in the next avast version.

http://forum.avast.com/index.php?topic=20065.0;topicseen
« Last Edit: March 22, 2006, 12:40:34 PM by Tech »
The best things in life are free.

Blauvogel

  • Guest
Re: Too many rights
« Reply #6 on: March 22, 2006, 12:57:14 PM »
Sorry, I've misunderstood you.
No problem, I'm from Germany and my English is very bad.
The problem is only on avast installation folder.
What do you mean "avast installation folder"? All folders and files below "Alwil Software" have full rights to everybody.
You're right, this is a known issue that will be corrected in the next avast version.
That is good. But it would be better if it will done by the next update. No folder below program files must be writeable by unprivileged users. The updates are done by "avast! iAVS4 Control Service" which runs under the local system account. This account has all rights.
The chest folder can be placed below %APPDATA%.

Offline Lisandro

  • Avast team
  • Certainly Bot
  • *
  • Posts: 67194
Re: Too many rights
« Reply #7 on: March 22, 2006, 03:24:52 PM »
What do you mean "avast installation folder"?
C:\Program Files\Alwil Software\
and all subfolders like you've said.

That is good. But it would be better if it will done by the next update. No folder below program files must be writeable by unprivileged users. The updates are done by "avast! iAVS4 Control Service" which runs under the local system account. This account has all rights.
The chest folder can be placed below %APPDATA%.
I think this is exactly what they're thinking about.
The best things in life are free.