From f50d8a242be98260ba3b6289bc9165e4223cad92 Mon Sep 17 00:00:00 2001 From: DavidXanatos <3890945+DavidXanatos@users.noreply.github.com> Date: Sun, 2 Jun 2024 15:43:16 +0200 Subject: [PATCH] Update ipc.c --- Sandboxie/core/drv/ipc.c | 108 ++++++++++++++++----------------------- 1 file changed, 45 insertions(+), 63 deletions(-) diff --git a/Sandboxie/core/drv/ipc.c b/Sandboxie/core/drv/ipc.c index e127fc52..642da0f6 100644 --- a/Sandboxie/core/drv/ipc.c +++ b/Sandboxie/core/drv/ipc.c @@ -1395,27 +1395,44 @@ _FX NTSTATUS Ipc_Api_DuplicateObject(PROCESS *proc, ULONG64 *parms) status = Ipc_CheckObjectName(SourceHandle, UserMode); // - // if the source handle is in another process, we use KeStackAttachProcess - // to be able to examine the handle + // if the source handle is in another process, we have to duplicate + // it before we can examine it, so duplicate first without the + // DUPLICATE_CLOSE_SOURCE option // } else if (IS_ARG_CURRENT_PROCESS(TargetProcessHandle)) { - void *SourceTargetProcessObject; - status = ObReferenceObjectByHandle( - SourceProcessHandle, 0, *PsProcessType, UserMode, - &SourceTargetProcessObject, NULL); + // + // we duplicate the handle into kernel space such that that user + // won't be able to grab it while we are evaluaiting it + // + HANDLE SourceProcessKernelHandle; + status = Thread_GetKernelHandleForUserHandle(&SourceProcessKernelHandle, SourceProcessHandle); if (NT_SUCCESS(status)) { - KAPC_STATE apcState; - KeStackAttachProcess(SourceTargetProcessObject, &apcState); + HANDLE TargetProcessKernelHandle = ZwCurrentProcess(); // TargetProcessHandle == NtCurrentProcess(); + + // + // driver verifier wants us to provide a kernel handle as process handles + // but the source handle must be a user handle and the ZwDuplicateObject + // function creates another user handle hence NtClose + // - status = Ipc_CheckObjectName(SourceHandle, UserMode); + status = ZwDuplicateObject( + SourceProcessKernelHandle, SourceHandle, + TargetProcessKernelHandle, &DuplicatedHandle, + DesiredAccess, HandleAttributes, + Options & ~DUPLICATE_CLOSE_SOURCE); - KeUnstackDetachProcess(&apcState); + if (NT_SUCCESS(status)) { - ObDereferenceObject(SourceTargetProcessObject); + status = Ipc_CheckObjectName(DuplicatedHandle, UserMode); + + NtClose(DuplicatedHandle); + } + + ZwClose(SourceProcessKernelHandle); } } else @@ -1427,65 +1444,30 @@ _FX NTSTATUS Ipc_Api_DuplicateObject(PROCESS *proc, ULONG64 *parms) if (NT_SUCCESS(status)) { - PROCESS* proc1 = NULL; - if (!IS_ARG_CURRENT_PROCESS(SourceProcessHandle)) - proc1 = Process_Find_ByHandle(SourceProcessHandle, NULL); - else - proc1 = proc; - - PROCESS* proc2 = NULL; - if (!IS_ARG_CURRENT_PROCESS(TargetProcessHandle)) - proc2 = Process_Find_ByHandle(TargetProcessHandle, NULL); - else - proc2 = proc; - - if (proc1 != proc2 && (proc1 == NULL || proc2 == NULL || !Process_IsSameBox(proc1, proc2, 0))) { + HANDLE SourceProcessKernelHandle = (HANDLE)-1; + HANDLE TargetProcessKernelHandle = (HANDLE)-1; - status = NtDuplicateObject( - SourceProcessHandle, SourceHandle, - TargetProcessHandle, TargetHandle, - DesiredAccess, HandleAttributes, Options); + if (!IS_ARG_CURRENT_PROCESS(SourceProcessHandle)) + status = Thread_GetKernelHandleForUserHandle(&SourceProcessKernelHandle, SourceProcessHandle); + if (NT_SUCCESS(status)) { - } else { - - HANDLE SourceProcessKernelHandle; - if (!IS_ARG_CURRENT_PROCESS(SourceProcessHandle)) - status = Thread_GetKernelHandleForUserHandle(&SourceProcessKernelHandle, SourceProcessHandle); - else - SourceProcessKernelHandle = ZwCurrentProcess(); + if (!IS_ARG_CURRENT_PROCESS(TargetProcessHandle)) + status = Thread_GetKernelHandleForUserHandle(&TargetProcessKernelHandle, TargetProcessHandle); if (NT_SUCCESS(status)) { - HANDLE TargetProcessKernelHandle; - if (!IS_ARG_CURRENT_PROCESS(TargetProcessHandle)) - status = Thread_GetKernelHandleForUserHandle(&TargetProcessKernelHandle, TargetProcessHandle); - else - TargetProcessKernelHandle = ZwCurrentProcess(); - if (NT_SUCCESS(status)) { - HANDLE SourceKernelHandle; - status = Thread_GetKernelHandleForUserHandle(&SourceKernelHandle, SourceHandle); - if (NT_SUCCESS(status)) { + status = ZwDuplicateObject( + SourceProcessKernelHandle, SourceHandle, + TargetProcessKernelHandle, &DuplicatedHandle, + DesiredAccess, HandleAttributes, Options); - status = ZwDuplicateObject( - SourceProcessKernelHandle, SourceKernelHandle, - TargetProcessKernelHandle, &DuplicatedHandle, - DesiredAccess, HandleAttributes, Options & ~DUPLICATE_CLOSE_SOURCE); - - if (Options & DUPLICATE_CLOSE_SOURCE) - NtClose(SourceHandle); - - *TargetHandle = DuplicatedHandle; - - ZwClose(SourceKernelHandle); - } - - if (!IS_ARG_CURRENT_PROCESS(TargetProcessKernelHandle)) - ZwClose(TargetProcessKernelHandle); - } - - if (!IS_ARG_CURRENT_PROCESS(SourceProcessKernelHandle)) - ZwClose(SourceProcessKernelHandle); + *TargetHandle = DuplicatedHandle; } } + + if (SourceProcessKernelHandle && !IS_ARG_CURRENT_PROCESS(SourceProcessKernelHandle)) + ZwClose(SourceProcessKernelHandle); + if (TargetProcessKernelHandle && !IS_ARG_CURRENT_PROCESS(TargetProcessKernelHandle)) + ZwClose(TargetProcessKernelHandle); } //