Windows 8 UAC

Nikos751

Level 20
Thread author
Verified
Malware Tester
Feb 1, 2013
969
DrBeenGolfing said:
You can see evidence of this yourself by opening MSPaint, using the File Open dialog as a mini-file manager, and making changes within Program Files (e.g. create a folder or rename something); it'll let you do that without the UAC prompt that non-MS apps should trigger. I doubt that is intentional and it shows how little thought has gone into the UAC whitelist hacks MS have added to make their own apps seem better.

If I open paint from my standard account in Win8 (UAC setting full)and do that, UAC asks for permission to create a folder. If run it as admin it does it without any UAC prompt. Exactly the same happens with vlc when going to "open" entry on file menu etc.
 

Littlebits

Retired Staff
May 3, 2011
3,893
Your answer is here- http://www.istartedsomething.com/20090613/windows-7-uac-code-injection-vulnerability-video-demonstration-source-code-released/

Issues were fixed before Windows 7 went final.

Enjoy!!:D
 
D

Deleted member 178

just remember that Ccleaner has an option to bypass UAC when launched... :D
 

Littlebits

Retired Staff
May 3, 2011
3,893
Umbra Corp. said:
just remember that Ccleaner has an option to bypass UAC when launched... :D

Because it is by digitally signed by a trusted vendor signer- Piriform Ltd. countersigner- Symantec. UAC gives files signed by trusted vendors passes but has to be enabled on the product, never enabled by default unless the product is a real-time security product.

Microsoft did this because many third-party security products would not be flagged by UAC.

Files that are not signed or have fake signature can not bypass UAC.

Thanks.:D
 

jamescv7

Level 85
Verified
Honorary Member
Mar 15, 2011
13,070
The problem only for UAC is even no signature from a file itself still allowed by default which isn't recommended and max level could guarantee enough to make everything is undergone process.
 

Littlebits

Retired Staff
May 3, 2011
3,893
Fabian Wosar said:
None whatsoever. They moved a few tasks around to no longer require admin privileges to perform to reduce the number of elevation requests you get, but other than that it is pretty much the same and still has the same vulnerabilities as UAC in Windows 7.

Fabian Wosar said:
Littlebits said:
But the changes are there which includes many improvements.
To exactly what they are nobody seems to know but Microsoft.
Well obviously you know that there are some. So what are your sources? :)


To clear up a few things both statements can not be backed up by facts, since Microsoft doesn't release detailed changelogs.

Fabian Wosar has the same right to his opinion as so do I.

There is no info that can be found that Microsoft didn't make any improvements to UAC on Windows 8 or what improvements all were made except for other user opinions. To myself it wouldn't appear logical that Microsoft would release a new OS and do nothing at all to improve UAC.

Since there really isn't any facts to backup the claim either way, it is up to the user to believe what they want to.

The facts:

Does UAC on Windows still have vulnerabilities?

Yes it does, every component of Windows and other OS, software, etc. has vulnerabilities whether it is known or not. Just because a vulnerability is known doesn't mean it will be exploited by malware. Many past vulnerabilities in OS components, software, etc. were never exploited.
Most software developers like Microsoft will patch the vulnerabilities that have been known to be exploited first and worry about the others later.

Has vulnerabilities in UAC been exploited by malware?
There is no info or malware samples been known to do this yet. Possibly as malware evolves it could happen. Most malware now uses fake alert websites and other methods to fool users into manual downloading and executing malicious files. This method is very successful it doesn't require malware writers to have to use complex methods like exploits to infect systems. Users will simply ignore UAC warnings and approve the malicious processes.

Many reports and tests on the web misleads users into believing that Windows 8 default security is no good.

Also many reports and test mislead users into believing that just because there is a known vulnerability it is automatically exploited by malicious activities which is not always true.

I hope that explains a little more.

Thanks.:D
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top