aboutsummaryrefslogtreecommitdiff
path: root/src/burn/engine/ba.h (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Protect elevated working folder from malicious dataRob Mensching2024-03-221-0/+1
| | | | | | | | | | | | | | | When running elevated, Burn uses the Windows Temp folder as its working folder to prevent normal processes from tampering with the files. Windows Temp does allow non-elevated processes to write to the folder but they cannot see the files there. Unfortunately, contrary to our belief, non-elevated processes can read the files in Windows Temp by watching for directory changes. This allows a malicious process to lie in wait, watching the Windows Temp folder until a Burn process is launched elevated, then attack the working folder. Mitigate that attack by protecting the working folder to only elevated users. Managed custom actions also fall back to using the Windows Temp folder in some cases and thus can be exposed in a similar fashion as an elevated Burn process. Remove that possibility.
* WIP - BA header simplificationRob Mensching2024-03-061-0/+160