exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Alienware Command Center 2.8.8.0 Local Privilege Escalation

Alienware Command Center 2.8.8.0 Local Privilege Escalation
Posted Feb 25, 2015
Authored by Humberto Cabrera | Site zeroscience.mk

Alienware Command Center version 2.8.8.0 suffers from an unquoted search path issue impacting the service 'ioloenergybooster' for Windows. This could potentially allow an authorized but non-privileged local user to execute arbitrary code with elevated privileges on the system.

tags | advisory, arbitrary, local
systems | windows
SHA-256 | 63f2538dadd62b01d9a1bdd72381e85972ffeb5361dcf205055e2e2870241cf9

Alienware Command Center 2.8.8.0 Local Privilege Escalation

Change Mirror Download
Advisory Url: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5229.php

Alienware Command Center 2.8.8.0 Local Privilege Escalation

Title: Alienware Command Center 2.8.8.0 Local Privilege Escalation
Advisory ID: ZSL-2015-5229
Type: Local
Impact: Privilege Escalation
Risk: (2/5)
Release Date: 25.02.2015
Summary

Alienware Command Center is a software program developed by Alienware. The
most common release is 2.8.8.0, with over 98% of all installations
currently using this version. During setup, the program creates a startup
registration point in Windows in order to automatically start when any
user boots the PC. Upon being installed, the software adds a Windows
Service which is designed to run continuously in the background. Manually
stopping the service has been seen to cause the program to stop functing
properly. It adds a background controller service that is set to
automatically run. Delaying the start of this service is possible through
the service manager. A scheduled task is added to Windows Task Scheduler
in order to launch the program at various scheduled times (the schedule
varies depending on the version). The primary executable is named
AlienFusion.exe. The setup package generally installs about 99 files and
is usually about 19.05 MB (19,979,162 bytes).
Description

The application suffers from an unquoted search path issue impacting the
service 'ioloenergybooster' for Windows deployed as part of Alienware
Command Center. This could potentially allow an authorized but
non-privileged local user to execute arbitrary code with elevated
privileges on the system. A successful attempt would require the local
user to be able to insert their code in the system root path undetected by
the OS or other security applications where it could potentially be
executed during application startup or reboot. If successful, the local
user’s code would execute with the elevated privileges of the application.
Vendor

Alienware Corporation - http://www.alienware.com
Affected Version

2.8.8.0
Tested On

Microsoft Windows 8
Vendor Status

N/A
PoC

alienware_eop.txt
Credits

Vulnerability discovered by Humberto Cabrera - <humbe@zeroscience.mk>
References

N/A
Changelog

[25.02.2015] - Initial release
Contact

Zero Science Lab

Web: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close