A. THE BUG/ISSUE (Varies from issue to issue) Can U reproduce the problem & if so how reliably?:
Yes, every time. If U can, exact steps to reproduce. If not, exactly what U did & what happened:
1: Disable the Auto-Sandbox and enable the HIPS.
2: Download the sample and then run it. Allow all HIPS alerts, but no firewall alerts.
3: When I run the sample it is injected into the process “svchost”. After this the app is allowed to connect to the internet without triggering a firewall alert. One or two sentences explaining what actually happened:
If all HIPS alerts are allowed for the sample it is able to bypass the firewall. One or two sentences explaining what you expected to happen:
Even with all HIPS alerts allowed the firewall should still be able to restrict the app from connecting to the internet. This is a vulnerability. If a software compatibility problem have you tried the advice to make programs work with CIS?:
NA Any software except CIS/OS involved? If so - name, & exact version:
NA Any other information, eg your guess at the cause, how U tried to fix it etc:
A video which shows this issue can be downloaded from here: http://www.myupload.dk/showfile/c4ix93.7z
Even at maximum configurable protection, with Auto-Sandbox disabled and HIPS enabled, it is still allowed to bypass the firewall if all HIPS alerts are allowed.
The sample has a digital signature fake,. Maybe this is the main reason, I’m not sure of this because Comodo did not trust the digital signature.
B. YOUR SETUP Exact CIS version & configuration:
CIS 8.0.332922.4281 BETA
Modules enabled & level. D+/HIPS, Autosandbox/BBlocker, Firewall, & AV:
Configuration: firewall Security Have U made any other changes to the default config? (egs here.):
firewall: safe mode and custom Ruleset Have U updated (without uninstall) from CIS 5 or CIS6?:
No if so, have U tried a a a clean reinstall - if not please do?:
NA Have U imported a config from a previous version of CIS:
No if so, have U tried a standard config - if not please do:
NA OS version, SP, 32/64 bit, UAC setting, account type, V.Machine used:
V.Machine : virtual box , win 7 x32 Other security/s’box software a) currently installed b) installed since OS, including initial trial security software included with system:
a=None b=None
I watched the video, and I noticed that there were many Defense+ HIPS alerts, of which you allowed all. I assume that if you denied them, or perhaps even just one of them, the injection would fail. Thus, please clarify which alert you were expecting (and did not receive) and why it is a bug when so many other alerts were shown. I’m trying to fully understand this issue.
What happens if you switch to Proactive Security. Then, without changing any other settings, disable the Auto-Sandbox. Then see if running the app causes a Firewall alert?
Also, please try the same, only under Proactive Security now have the Auto-Sandbox enabled, and the HIPS disabled. Then see if running the app causes a Firewall alert?
From the videos it seems that the injection is caught by CIS. It is only successful because all of the alerts were allowed. I’m not sure where you are saying the bug is? Please clarify in words as I know I am misunderstanding something.
Isn’t that allowed though because you allowed a system process to be patched? My thoughts are that perhaps, since you allowed the other file to be altered, that you have therefore compromised the system.
“hips” nothing to do with to bypass the firewall, the firewall is not monitor the contact injected into the process “svchost” because it is trusted from Comodo
Suppose that a customer uses a firewall only, does not need to hips and Sandbox ,Simply will be Hack the client machine without any alert of the firewall
Okay. I have asked mouse1 if they have any insights to this issue. They are very busy at the moment, but hopefully they will be able to look it over in the near future.
Are you sure? Block alert you allowed (see attach) and look at result.
the firewall is not monitor the contact injected into the process "svchost" because it is trusted from Comodo
The firewall does not detect injection into the processes, it's not the firewall problem. It manages network permissions only.
Suppose that a customer uses a firewall only, does not need to hips and Sandbox ,Simply will be Hack the client machine without any alert of the firewall
If customer uses only the firewall without HIPS, about any protection, except network connections control, can not be considered.