Windows NT 4.0 source code leak
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

574 lines
13 KiB

4 years ago
  1. /*++
  2. Copyright (c) 1989 Microsoft Corporation
  3. Module Name:
  4. Privileg.c
  5. Abstract:
  6. This Module implements the privilege check procedures.
  7. Author:
  8. Robert Reichel (robertre) 26-Nov-90
  9. Environment:
  10. Kernel Mode
  11. Revision History:
  12. --*/
  13. #include "tokenp.h"
  14. #ifdef ALLOC_PRAGMA
  15. #pragma alloc_text(PAGE,NtPrivilegeCheck)
  16. #pragma alloc_text(PAGE,SeCheckPrivilegedObject)
  17. #pragma alloc_text(PAGE,SepPrivilegeCheck)
  18. #pragma alloc_text(PAGE,SePrivilegeCheck)
  19. #pragma alloc_text(PAGE,SeSinglePrivilegeCheck)
  20. #endif
  21. BOOLEAN
  22. SepPrivilegeCheck(
  23. IN PTOKEN Token,
  24. IN OUT PLUID_AND_ATTRIBUTES RequiredPrivileges,
  25. IN ULONG RequiredPrivilegeCount,
  26. IN ULONG PrivilegeSetControl,
  27. IN KPROCESSOR_MODE PreviousMode
  28. )
  29. /*++
  30. Routine Description:
  31. Worker routine for SePrivilegeCheck
  32. Arguments:
  33. Token - The user's effective token.
  34. RequiredPrivileges - A privilege set describing the required
  35. privileges. The UsedForAccess bits will be set in any privilege
  36. that is actually used (usually all of them).
  37. RequiredPrivilegeCount - How many privileges are in the
  38. RequiredPrivileges set.
  39. PrivilegeSetControl - Describes how many privileges are required.
  40. PreviousMode - The previous processor mode.
  41. Return Value:
  42. Returns TRUE if requested privileges are granted, FALSE otherwise.
  43. --*/
  44. {
  45. PLUID_AND_ATTRIBUTES CurrentRequiredPrivilege;
  46. PLUID_AND_ATTRIBUTES CurrentTokenPrivilege;
  47. BOOLEAN RequiredAll;
  48. ULONG TokenPrivilegeCount;
  49. ULONG MatchCount = 0;
  50. ULONG i;
  51. ULONG j;
  52. PAGED_CODE();
  53. //
  54. // Take care of kernel callers first
  55. //
  56. if (PreviousMode == KernelMode) {
  57. return(TRUE);
  58. }
  59. SepAcquireTokenReadLock( Token );
  60. TokenPrivilegeCount = Token->PrivilegeCount;
  61. //
  62. // Save whether we require ALL of them or ANY
  63. //
  64. RequiredAll = (BOOLEAN)(PrivilegeSetControl & PRIVILEGE_SET_ALL_NECESSARY);
  65. for ( i = 0 , CurrentRequiredPrivilege = RequiredPrivileges ;
  66. i < RequiredPrivilegeCount ;
  67. i++, CurrentRequiredPrivilege++ ) {
  68. for ( j = 0, CurrentTokenPrivilege = Token->Privileges;
  69. j < TokenPrivilegeCount ;
  70. j++, CurrentTokenPrivilege++ ) {
  71. if ((CurrentTokenPrivilege->Attributes & SE_PRIVILEGE_ENABLED) &&
  72. (RtlEqualLuid(&CurrentTokenPrivilege->Luid,
  73. &CurrentRequiredPrivilege->Luid))
  74. ) {
  75. CurrentRequiredPrivilege->Attributes |=
  76. SE_PRIVILEGE_USED_FOR_ACCESS;
  77. MatchCount++;
  78. break; // start looking for next one
  79. }
  80. }
  81. }
  82. SepReleaseTokenReadLock( Token );
  83. //
  84. // If we wanted ANY and didn't get any, return failure.
  85. //
  86. if (!RequiredAll && (MatchCount == 0)) {
  87. return (FALSE);
  88. }
  89. //
  90. // If we wanted ALL and didn't get all, return failure.
  91. //
  92. if (RequiredAll && (MatchCount != RequiredPrivilegeCount)) {
  93. return(FALSE);
  94. }
  95. return(TRUE);
  96. }
  97. BOOLEAN
  98. SePrivilegeCheck(
  99. IN OUT PPRIVILEGE_SET RequiredPrivileges,
  100. IN PSECURITY_SUBJECT_CONTEXT SubjectSecurityContext,
  101. IN KPROCESSOR_MODE AccessMode
  102. )
  103. /*++
  104. Routine Description:
  105. This routine checks to see if the token contains the specified
  106. privileges.
  107. Arguments:
  108. RequiredPrivileges - Points to a set of privileges. The subject's
  109. security context is to be checked to see which of the specified
  110. privileges are present. The results will be indicated in the
  111. attributes associated with each privilege. Note that
  112. flags in this parameter indicate whether all the privileges listed
  113. are needed, or any of the privileges.
  114. SubjectSecurityContext - A pointer to the subject's captured security
  115. context.
  116. AccessMode - Indicates the access mode to use for access check. One of
  117. UserMode or KernelMode. If the mode is kernel, then all privileges
  118. will be marked as being possessed by the subject, and successful
  119. completion status is returned.
  120. Return Value:
  121. BOOLEAN - TRUE if all specified privileges are held by the subject,
  122. otherwise FALSE.
  123. --*/
  124. {
  125. BOOLEAN Status;
  126. PAGED_CODE();
  127. //
  128. // If we're impersonating a client, we have to be at impersonation level
  129. // of SecurityImpersonation or above.
  130. //
  131. if ( (SubjectSecurityContext->ClientToken != NULL) &&
  132. (SubjectSecurityContext->ImpersonationLevel < SecurityImpersonation)
  133. ) {
  134. return(FALSE);
  135. }
  136. //
  137. // SepPrivilegeCheck locks the passed token for read access
  138. //
  139. Status = SepPrivilegeCheck(
  140. EffectiveToken( SubjectSecurityContext ),
  141. RequiredPrivileges->Privilege,
  142. RequiredPrivileges->PrivilegeCount,
  143. RequiredPrivileges->Control,
  144. AccessMode
  145. );
  146. return(Status);
  147. }
  148. NTSTATUS
  149. NtPrivilegeCheck(
  150. IN HANDLE ClientToken,
  151. IN OUT PPRIVILEGE_SET RequiredPrivileges,
  152. OUT PBOOLEAN Result
  153. )
  154. /*++
  155. Routine Description:
  156. This routine tests the caller's client's security context to see if it
  157. contains the specified privileges.
  158. This API requires the caller have SeTcbPrivilege privilege. The test
  159. for this privilege is always against the primary token of the calling
  160. process, not the impersonation token of the thread.
  161. Arguments:
  162. ClientToken - A handle to a token object representing a client
  163. attempting access. This handle must be obtained from a
  164. communication session layer, such as from an LPC Port or Local
  165. Named Pipe, to prevent possible security policy violations.
  166. RequiredPrivileges - Points to a set of privileges. The client's
  167. security context is to be checked to see which of the specified
  168. privileges are present. The results will be indicated in the
  169. attributes associated with each privilege. Note that
  170. flags in this parameter indicate whether all the privileges listed
  171. are needed, or any of the privileges.
  172. Result - Receives a boolean flag indicating whether the client has all
  173. the specified privileges or not. A value of TRUE indicates the
  174. client has all the specified privileges. Otherwise a value of
  175. FALSE is returned.
  176. Return Value:
  177. STATUS_SUCCESS - Indicates the call completed successfully.
  178. STATUS_PRIVILEGE_NOT_HELD - Indicates the caller does not have
  179. sufficient privilege to use this privileged system service.
  180. --*/
  181. {
  182. BOOLEAN BStatus;
  183. KPROCESSOR_MODE PreviousMode;
  184. NTSTATUS Status;
  185. PLUID_AND_ATTRIBUTES CapturedPrivileges = NULL;
  186. PTOKEN Token;
  187. ULONG CapturedPrivilegeCount;
  188. ULONG CapturedPrivilegesLength;
  189. ULONG ParameterLength;
  190. ULONG PrivilegeSetControl;
  191. PAGED_CODE();
  192. PreviousMode = KeGetPreviousMode();
  193. Status = ObReferenceObjectByHandle(
  194. ClientToken, // Handle
  195. TOKEN_QUERY, // DesiredAccess
  196. SepTokenObjectType, // ObjectType
  197. PreviousMode, // AccessMode
  198. (PVOID *)&Token, // Object
  199. NULL // GrantedAccess
  200. );
  201. if ( !NT_SUCCESS(Status) ) {
  202. return Status;
  203. }
  204. //
  205. // If the passed token is an impersonation token, make sure
  206. // it is at SecurityIdentification or above.
  207. //
  208. if (Token->TokenType == TokenImpersonation) {
  209. if (Token->ImpersonationLevel < SecurityIdentification) {
  210. ObDereferenceObject( (PVOID)Token );
  211. return( STATUS_BAD_IMPERSONATION_LEVEL );
  212. }
  213. }
  214. try {
  215. //
  216. // Capture passed Privilege Set
  217. //
  218. ProbeForWrite(
  219. RequiredPrivileges,
  220. sizeof(PRIVILEGE_SET),
  221. sizeof(ULONG)
  222. );
  223. ParameterLength = (ULONG)sizeof(PRIVILEGE_SET) +
  224. ((RequiredPrivileges->PrivilegeCount - ANYSIZE_ARRAY) *
  225. (ULONG)sizeof(LUID_AND_ATTRIBUTES) );
  226. ProbeForWrite(
  227. RequiredPrivileges,
  228. ParameterLength,
  229. sizeof(ULONG)
  230. );
  231. ProbeForWriteBoolean(Result);
  232. PrivilegeSetControl = RequiredPrivileges->Control;
  233. CapturedPrivilegeCount = RequiredPrivileges->PrivilegeCount;
  234. } except(EXCEPTION_EXECUTE_HANDLER) {
  235. ObDereferenceObject( (PVOID)Token );
  236. return GetExceptionCode();
  237. }
  238. Status = SeCaptureLuidAndAttributesArray(
  239. (RequiredPrivileges->Privilege),
  240. CapturedPrivilegeCount,
  241. UserMode,
  242. NULL, 0,
  243. PagedPool,
  244. TRUE,
  245. &CapturedPrivileges,
  246. &CapturedPrivilegesLength
  247. );
  248. if (!NT_SUCCESS(Status)) {
  249. ObDereferenceObject( (PVOID)Token );
  250. return Status;
  251. }
  252. ASSERT(CapturedPrivileges != NULL);
  253. BStatus = SepPrivilegeCheck(
  254. Token, // Token,
  255. CapturedPrivileges, // RequiredPrivileges,
  256. CapturedPrivilegeCount, // RequiredPrivilegeCount,
  257. PrivilegeSetControl, // PrivilegeSetControl
  258. PreviousMode // PreviousMode
  259. );
  260. ObDereferenceObject( Token );
  261. try {
  262. //
  263. // copy the modified privileges buffer back to user
  264. //
  265. RtlMoveMemory(
  266. RequiredPrivileges->Privilege,
  267. CapturedPrivileges,
  268. CapturedPrivilegesLength
  269. );
  270. *Result = BStatus;
  271. } except (EXCEPTION_EXECUTE_HANDLER) {
  272. SeReleaseLuidAndAttributesArray(
  273. CapturedPrivileges,
  274. PreviousMode,
  275. TRUE
  276. );
  277. return(GetExceptionCode());
  278. }
  279. SeReleaseLuidAndAttributesArray(
  280. CapturedPrivileges,
  281. PreviousMode,
  282. TRUE
  283. );
  284. return( STATUS_SUCCESS );
  285. }
  286. BOOLEAN
  287. SeSinglePrivilegeCheck(
  288. LUID PrivilegeValue,
  289. KPROCESSOR_MODE PreviousMode
  290. )
  291. /*++
  292. Routine Description:
  293. This function will check for the passed privilege value in the
  294. current context.
  295. Arguments:
  296. PrivilegeValue - The value of the privilege being checked.
  297. Return Value:
  298. TRUE - The current subject has the desired privilege.
  299. FALSE - The current subject does not have the desired privilege.
  300. --*/
  301. {
  302. BOOLEAN AccessGranted;
  303. PRIVILEGE_SET RequiredPrivileges;
  304. SECURITY_SUBJECT_CONTEXT SubjectSecurityContext;
  305. PAGED_CODE();
  306. //
  307. // Make sure the caller has the privilege to make this
  308. // call.
  309. //
  310. RequiredPrivileges.PrivilegeCount = 1;
  311. RequiredPrivileges.Control = PRIVILEGE_SET_ALL_NECESSARY;
  312. RequiredPrivileges.Privilege[0].Luid = PrivilegeValue;
  313. RequiredPrivileges.Privilege[0].Attributes = 0;
  314. SeCaptureSubjectContext( &SubjectSecurityContext );
  315. AccessGranted = SePrivilegeCheck(
  316. &RequiredPrivileges,
  317. &SubjectSecurityContext,
  318. PreviousMode
  319. );
  320. if ( PreviousMode != KernelMode ) {
  321. SePrivilegedServiceAuditAlarm (
  322. NULL, // BUGWARNING need service name
  323. &SubjectSecurityContext,
  324. &RequiredPrivileges,
  325. AccessGranted
  326. );
  327. }
  328. SeReleaseSubjectContext( &SubjectSecurityContext );
  329. return( AccessGranted );
  330. }
  331. BOOLEAN
  332. SeCheckPrivilegedObject(
  333. LUID PrivilegeValue,
  334. HANDLE ObjectHandle,
  335. ACCESS_MASK DesiredAccess,
  336. KPROCESSOR_MODE PreviousMode
  337. )
  338. /*++
  339. Routine Description:
  340. This function will check for the passed privilege value in the
  341. current context, and generate audits as appropriate.
  342. Arguments:
  343. PrivilegeValue - The value of the privilege being checked.
  344. Object - Specifies a pointer to the object being accessed.
  345. ObjectHandle - Specifies the object handle being used.
  346. DesiredAccess - The desired access mask, if any
  347. PreviousMode - The previous processor mode
  348. Return Value:
  349. TRUE - The current subject has the desired privilege.
  350. FALSE - The current subject does not have the desired privilege.
  351. --*/
  352. {
  353. BOOLEAN AccessGranted;
  354. PRIVILEGE_SET RequiredPrivileges;
  355. SECURITY_SUBJECT_CONTEXT SubjectSecurityContext;
  356. PAGED_CODE();
  357. //
  358. // Make sure the caller has the privilege to make this
  359. // call.
  360. //
  361. RequiredPrivileges.PrivilegeCount = 1;
  362. RequiredPrivileges.Control = PRIVILEGE_SET_ALL_NECESSARY;
  363. RequiredPrivileges.Privilege[0].Luid = PrivilegeValue;
  364. RequiredPrivileges.Privilege[0].Attributes = 0;
  365. SeCaptureSubjectContext( &SubjectSecurityContext );
  366. AccessGranted = SePrivilegeCheck(
  367. &RequiredPrivileges,
  368. &SubjectSecurityContext,
  369. PreviousMode
  370. );
  371. if ( PreviousMode != KernelMode ) {
  372. SePrivilegeObjectAuditAlarm(
  373. ObjectHandle,
  374. &SubjectSecurityContext,
  375. DesiredAccess,
  376. &RequiredPrivileges,
  377. AccessGranted,
  378. PreviousMode
  379. );
  380. }
  381. SeReleaseSubjectContext( &SubjectSecurityContext );
  382. return( AccessGranted );
  383. }