How to Break Microsoft Rights Management Services

نویسندگان

  • Martin Grothe
  • Christian Mainka
  • Paul Rösler
  • Jörg Schwenk
چکیده

Rights Management Services (RMS) are used to enforce access control in a distributed environment, and to cryptographically protect companies’ assets by restricting access rights, for example, to view-only, edit, print, etc., on a per-document basis. One of the most prominent RMS implementations is Microsoft RMS. It can be found in Active Directory (AD) and Azure. Previous research concentrated on generic weaknesses of RMS, but did not present attacks on real world systems. We provide a security analysis of Microsoft RMS and present two working attacks: (1.) We completely remove the RMS protection of a Word document on which we only have a view-only permission, without having the right to edit it. This shows that in contrast to claims made by Microsoft, Microsoft RMS can only be used to enforce all-or-nothing access. (2.) We extend this attack to be stealthy in the following sense: We show how to modify the content of an RMS write-protected Word document issued by our victim. The resulting document still claims to be write protected, and that the modified content was generated by the victim. We show that these attacks are not limited to local instances of Microsoft AD, and can be extended to Azure RMS and Office 365. We responsibly disclosed our findings to Microsoft. They acknowledged our findings (MSRC Case 33210).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Theoretical Framework for People's Space Rights From the Perspective of Jurisprudence and Islamic Law

Urban space in the present age is a finite and very limited commodity, which is justly exploited in the area of ​​emerging jurisdiction in the field of architectural and urban law. By applying this penal law to the discretion, the measurement can be made by using effective services, in the public space of the city. Users of architecture, adding special Brosbin, (virtualization that can be done ...

متن کامل

Operationalization of the Ghanaian Patients’ Charter in a Peri-urban Public Hospital: Voices of Healthcare Workers and Patients

Background Health is a basic human right necessary for the exercise of other human rights. Every human being is, therefore, entitled to the highest possible standard of health necessary to living a life of dignity. Establishment of patients’ Charter is a step towards protecting the rights and responsibilities of patients, but violation of patients’ rights is common in healthcare institutions, e...

متن کامل

Collaborative Environmental Data Management Framework for Microsoft Excel

In many companies Microsoft Excel is often used as a CEMIS for managing environmental data. In collaborative scenarios this single-user application often causes problems. In this article, the multi user framework Quexolver is presented, which supports the simultaneous processing of environmental data in Excel by multiple users. The multi-user capability is provided by introducing a role and rig...

متن کامل

D-foaf - Security Aspects in Distributed User Management System

The contemporary Internet offers various services ranging from electronic newspapers to online social networks. To authorize themselves, users have to register to on-line services. However, most of the authentication and user management systems are incompatible with each other. Therefore the registration process must be repeated each time from the beginning, requiring multiple login-password-si...

متن کامل

Windows Media 9 Series - a platform to deliver compressed audio and video for Internet and broadcast applications

Microsoft® Windows Media® 9 Series is a set of technologies that enables rich digital media experiences across all types of networks and devices. These technologies include an encoder to author the multimedia content, a server to distribute the content, a Digital Rights Management (DRM) system to let content owners set usage policies, and a variety of players to decode and render the content on...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016