Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      itsMe

      Sandboxie 5.46.2 / Sandboxie Plus 0.5.4 - Hotfix2

      Recommended Posts

      Staff

      Hidden Content

        Give reaction to this post to see the hidden content.

      Release v0.5.4 / 5.46.2 - Hotfix 2

      Urgent security fixes (thanks @diversenok)

      fix

      Build 5.46.0 resolves many box isolation issues some of them critical that could allow rogue applications to escape the sandbox. It is highly advised to upgrade quickly to the new builds. For further details please review the change log below.
      If you have issues with an update installation, just uninstall the previous version keeping the sandboxie.ini and reinstall the new build.
      You can support the project through donations, any help will be greatly appreciated.

      Hotfix2 (5.46.2) Changelog
      Added

          added "CallTrace=*" to log all system calls to the access log

      Changed

          improved ipc logging code
          improved MSG_2101 logging

      Fixed

          fixed more issues with ipc tracing
          fixed SBIE2101 issue with crome and derivatives

      Hidden Content

        Give reaction to this post to see the hidden content.

      Share this post


      Link to post
      Share on other sites

      Join the conversation

      You can post now and register later. If you have an account, sign in now to post with your account.
      Note: Your post will require moderator approval before it will be visible.

      Guest
      Reply to this topic...

      ×   Pasted as rich text.   Paste as plain text instead

      ×   Your link has been automatically embedded.   Display as a link instead

      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Sandboxie
          Sandboxie is a sandbox-based isolation software for 32- and 64-bit Windows NT-based operating systems. It creates a sandbox-like isolated operating environment in which applications can be run or installed without permanently modifying local & mapped drives or the windows registry. An isolated virtual environment allows controlled testing of untrusted programs and web surfing.
          Hotfix Changelog
          Added
              added "RunServiceAsSystem=..." allows specific named services to be ran as system
          Changed
              refactored some code around SCM access
          Fixed
              fixed a crash issue in SbieSvc.exe introduced with the last build
              fixed issue with sandman ui update check
          Removed
              removed "ProtectRpcSs=y" due to incompatybility with new isolation defaults
          Release Changelog
          Added
              Sandboxie now strips particularly problematic privileges from sandboxed system tokens
              -- with those a process could atempt to bypass the sandbox isolation (thanks Diversenok)
              -- old legacy behavior can be enabled with "StripSystemPrivileges=n" (absolutely NOT Recommended)
              added new isolation options "ClosePrintSpooler=y" and "OpenSmartCard=n"
              -- those resources are open by default but for a hardened box its desired to close them
              added print spooler filter to prevent printers from being set up outside the sandbox
              -- the filter can be disabled with "OpenPrintSpooler=y"
              added overwrite prompt when recovering an already existing file
              added "StartProgram=", "StartService=" and "AutoExec=" options to the SandMan UI
              added more compatybility templates (thanks isaak654)
          Changed
              Changed Emulated SCM behavior, boxed services are no longer by default started as boxed system
              -- use "RunServicesAsSystem=y" to enable the old legacy behavior
              -- Note: sandboxed services with a system token are still sandboxed and restricted
              -- However not granting them a system token in the first place removes possible exploit vectors
              -- Note: this option is not compatible with "ProtectRpcSs=y" and takes precedence!
              Reworked dynamic IPC port handling
              Improved Resource Monitor status strings
          Fixed
              fixed a critical issue that allowed to create processes outside the sandbox (thanks Diversenok)
              fixed issues with dynamic IPC port handling that allowed to bypass IPC isolation
              fixed issue with ipc tracing
              fixed CVE-2019-13502 "\RPC Control\LSARPC_ENDPOINT" is now filtered by the driver (thanks Diversenok)
              -- this allowed some system options to be changed, to disable filtering use "OpenLsaEndpoint=y"
              fixed hooking issues SBIE2303 with chrome, edge and possibly others
              fixed failed check for running processes when performing snapshot operations
              fixed some box option checkboxes were not properly initialized
              fixed unavailable options are not properly disabled when sandman is not connected to the driver
              fixed MSI instalelr issue, not being able to create "C:\Config.Msi" folder on windows 20H2
              added missing localization to generic list commands
              fixed issue with "iconcache_*" when runngin sandboxed explorer
              fixed more issues with groups

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Sandboxie
          Sandboxie is a sandbox-based isolation software for 32- and 64-bit Windows NT-based operating systems. It creates a sandbox-like isolated operating environment in which applications can be run or installed without permanently modifying local & mapped drives or the windows registry. An isolated virtual environment allows controlled testing of untrusted programs and web surfing.
          Release v0.5.4 / 5.46.0
          Urgent security fixes (thanks @diversenok)
          ChangeLog
          Added
              Sandboxie now strips particularly problematic privileges from sandboxed system tokens
              -- with those a process could atempt to bypass the sandbox isolation (thanks Diversenok)
              -- old legacy behavior can be enabled with "StripSystemPrivileges=n" (absolutely NOT Recommended)
              added new isolation options "ClosePrintSpooler=y" and "OpenSmartCard=n"
              -- those resources are open by default but for a hardened box its desired to close them
              added print spooler filter to prevent printers from being set up outside the sandbox
              -- the filter can be disabled with "OpenPrintSpooler=y"
              added overwrite prompt when recovering an already existing file
              added "StartProgram=", "StartService=" and "AutoExec=" options to the SandMan UI
              added more compatybility templates (thanks isaak654)
          Changed
              Changed Emulated SCM behavior, boxed services are no longer by default started as boxed system
              -- use "RunServicesAsSystem=y" to enable the old legacy behavior
              -- Note: sandboxed services with a system token are still sandboxed and restricted
              -- However not granting them a system token in the first place removes possible exploit vectors
              -- Note: this option is not compatible with "ProtectRpcSs=y" and takes precedence!
              Reworked dynamic IPC port handling
              Improved Resource Monitor status strings
          Fixed
              fixed a critical issue that allowed to create processes outside the sandbox (thanks Diversenok)
              fixed issues with dynamic IPC port handling that allowed to bypass IPC isolation
              fixed issue with ipc tracing
              fixed CVE-2019-13502 "\RPC Control\LSARPC_ENDPOINT" is now filtered by the driver (thanks Diversenok)
              -- this allowed some system options to be changed, to disable filtering use "OpenLsaEndpoint=y"
              fixed hooking issues SBIE2303 with chrome, edge and possibly others
              fixed failed check for running processes when performing snapshot operations
              fixed some box option checkboxes were not properly initialized
              fixed unavailable options are not properly disabled when sandman is not connected to the driver
              fixed MSI instalelr issue, not being able to create "C:\Config.Msi" folder on windows 20H2
              added missing localization to generic list commands
              fixed issue with "iconcache_*" when runngin sandboxed explorer
              fixed more issues with groups

          Hidden Content
          Give reaction to this post to see the hidden content.