-
-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
When I change VMWare Workstation Pro 16 (16.1.2 build-17966106) Virtual Network Editor in Sandboxie, the change affect the real system #1102
Comments
That is strange, changing other settings is contained but changing the bind adapter seams not very wired |
So as far as I can tell the device "\Device\VMnetUserif" allows to configure VMNet0 so as a workaround you can close that file path |
|
Is there any way to redirect the change into Sandboxie rather than closed file path \Device\VMnetUserif ? Because we can't using bridge network (VMnet0) anymore in Sandboxie if the path is closed. |
How would you use a bridge network in Sandboxie? What's your use case? |
My computer have a big memory. I create and mount a RAM disk, the Sandboxie work folder is in it. I prepare some VM, and run VMWare in Sandboxie, link clone the VM, and it could properly work. If I want to reset the VM to initial status, I only need to clean the Sandbox. It only take a few seconds. Besides, page files and suspend to disk feature are disabled, so the secret in VM never written to the disk. |
EDIT: David just replied me that ClosedFilePath is the only possible solution here. |
@0x391F EDIT: |
It is a general flaw in sbies security architecture to allow Device IO Control access to random devices at \Device* this issue will be remedied in a later release. It is possible to add a driver level control code filter for this device, but as its not a part of windows and will be closed by default, its not something I would want to spend my time on, If this is something extremely important for someone, them one can become a patron at one of the 3 highest tears, then I would look into that custom solution for this particular use case. |
The issue is taken care of by enabling the template DeviceSecurity The DeviceSecurity template uses the rule specificity feature to block all driver endpoints except the needed once, at least except those i knew are needed, probably some more would be needed to in more edge cases so it woudl be good to test this template and let me know if there is anythign else that should be open by defualt |
It was removed on v1.0.16, any progress about the fix? |
In one of the future builds a new hardened box mode will be introduced that prevents access to not opened device endpoints that will be the fix. |
Is there a technical reason not to apply the same endpoints restrictions to the standard box mode? |
Yes there is, it may break compatibility with some other software, so we should keep it to me enabled manually if the user needs/wants it |
Describe the bug
When I change VMWare Workstation Pro 16 (16.1.2 build-17966106) Virtual Network Editor in Sandboxie, the change affect out of the Sandboxie
To Reproduce
Steps to reproduce the behavior:
Original status:
Run VMWare Workstation Pro in Sandboxie with UAC Administrator privilege (otherwise couldn't startup any VM in Sandboxie)
Change the bridge adapter from Auto to physical network adapter (Realtek PCIe GbE Family Controller).
Click "OK" and exit
Clean up the Sandboxie
Run VMWare Workstation Pro, the bridge adapter changed to physical network adapter (Realtek PCIe GbE Family Controller)
Expected behavior
Any change inside Sandboxie shouldn't affect out of it.
Screenshots
System details and installed software (please provide the following information):
The text was updated successfully, but these errors were encountered: