A. THE BUG/ISSUE (Varies from issue to issue)
[ol]- Summary - Give a clear summary in the topic subject, NOT here.
-
Can U reproduce the problem & if so how reliably?:
Yes, every time. -
If U can, exact steps to reproduce. If not, exactly what U did & what happened:
Download SpyShelter Anti-Test from near the bottom of this page. Then, after unzipping it, right-click on AntiTest.exe and choose the option to “Run in COMODO Sandbox”.
Once it’s open click on the KeyLogging portion and click the button to “Start test”. Then, open your browser (on the real computer) and maximize the window so that it is definitely what has the attention. Then, click on the address bar and start typing something. After you have typed a few words go back to the SpyShelter leaktest and you will see that it has been logging every keystroke.
What this indicates is that it’s possible for a keylogger to be running in the FV Sandbox and yet be logging every keystroke you make while using your real computer for sensitive acts such as banking. When coupled this with the FV Sandbox vulnerability documented here, which details a method by which applications running in the FV Sandbox can bypass the Firewall and transmit information to the internet, this is a very critical vulnerability.
-
If not obvious, what U expected to happen:
A keylogger running in the FV Sandbox should not be able to log keys from the real computer. -
If a software compatibility problem have U tried the conflict FAQ?:
NA -
Any software except CIS/OS involved? If so - name, & exact version:
NA -
Any other information, eg your guess at the cause, how U tried to fix it etc:
Not sure. -
Always attach - Diagnostics file, Watch Activity process list, dump if freeze/crash. (If complex - CIS logs & config, screenshots, video, zipped program - not m’ware)
I have attached the diagnostics report and the KillSwitch process dump (both which were done while the keylogger was running in the FV Sandbox). Please let me know if it would be helpful to provide other attachments.
[/ol]
B. YOUR SETUP (Likely the same for each issue, so you can copy forward)
[ol]- Exact CIS version & configuration:
CIS version 6.1.275152.2801
Default Configuration
-
Modules enabled & level. D+/HIPS, Autosandbox/BBlocker, Firewall, & AV:
Default Configuration
However, I had to disable the AV and the Cloud lookup so it wouldn’t automatically flag the file as dangerous and remove it. -
Have U made any other changes to the default config? (egs here.):
Default Configuration
However, I had to disable the AV and the Cloud lookup so it wouldn’t automatically flag the file as dangerous and remove it. -
Have U updated (without uninstall) from a CIS 5?:
No, this was a clean install.
[li]if so, have U tried a a clean reinstall - if not please do?:
NA
[/li]- Have U imported a config from a previous version of CIS:
No
[li]if so, have U tried a standard config - if not please do:
NA
[/li]- OS version, SP, 32/64 bit, UAC setting, account type, V.Machine used:
Windows 7 x64 (fully updated), UAC disabled, Real System, run as administrator. -
Other security/s’box software a) currently installed b) installed since OS: a)
None b) none
[/ol]
[attachment deleted by admin]