henrypp/freeshooter

[Bug] 2.1.1 upgrade error window when opening

t0ma5 opened this issue · 5 comments

t0ma5 commented

Checklist

  • I have used the search function to see if someone else has already submitted the same bug report.
  • I will describe the problem with as much detail as possible.

App version

2.1.1

Windows version

W10 1809 17763

Steps to reproduce

Open the app after upgrade to 2.1.1

Expected behavior

Normal app opening

Actual behavior

Message:
The request is not supported.

Status:
-1073741637 (0xC00000BB)

Description:
ProcessRedirectionTrustPolicy

It opens normally after closing the error window

Logs

No response

really strange, ProcessRedirectionTrustPolicy is win8.1+ support on MSDN and it gives STATUS_NOT_SUPPORTED, dont know why

use this freeshooter.zip

t0ma5 commented

nice thanks! that portable version works.. I was missing it (portable) from a few releases ago, 2.0.7 I think

@henrypp: use this freeshooter.zip

v2.1.1 rev1 x64 Patch (21 Feb 2024):

  • No launch error when using freeshooter.exe from above ZIP archive

v2.1.1 x64 (12 Feb 2024):

  • ProcessRedirectionTrustPolicy error (-1073741637 (0xC00000BB)) upon every launch of Free Shooter

OS: Windows 10 v1909/19H2 r18363 x64 Home

Screenshot:

FreeShooter2.1.1(12Feb24)-LaunchError

@henrypp: really strange, ProcessRedirectionTrustPolicy is win8.1+ support on MSDN and it gives STATUS_NOT_SUPPORTED, dont know why

Is it related to the following ? Article seems to suggest that ProcessRedirectionTrustPolicy was "turned on" only in Win 10 22H2 onwards ?

There is no obvious way for Windows Home builds users to check the state of ProcessRedirectionTrustPolicy. If this exists in Win 8.1+, could it be that the skeleton framework is dormant & can't "wake up" unless the system receives a particular update ?

https://blog.doyensec.com/2023/03/21/windows-installer.html

In Oct 2022, Microsoft shipped a new feature called Redirection Guard on Windows 10 and Windows 11.

The update introduced a new type of mitigation called ProcessRedirectionTrustPolicy and the corresponding
PROCESS_MITIGATION_REDIRECTION_TRUST_POLICY structure.

If the mitigation is enabled for a given process, all processed junctions are additionally verified.
The verification first checks if the filesystem junction was created by non-admin users and, if so,
if the policy prevents following them.

If the operation is prevented, the error 0xC00004BC is returned.

The junctions created by admin users are explicitly allowed as having a higher trust-level label.

In the initial round, Redirection Guard was enabled for the print service. The 2022-02-14 update enabled
the same mitigation on the msiexec process.

The Redirection Guard should prevent an entire class of junction attacks and might significantly complicate
local privilege escalation attacks. While it addresses the previously mentioned issue, it also addresses
other types of installer bugs, such as when a privileged installer moves files from user-controlled directories.