exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

TISA-2007-09-Public.txt

TISA-2007-09-Public.txt
Posted Aug 30, 2007
Authored by Maldin d.o.o | Site teamintell.com

Team Intell Security Advisory TISA2007-09-Public - Microsoft Windows suffers from multiple improper file path handling issues.

tags | advisory
systems | windows
SHA-256 | e45443a257b76bae17116bc5cf8436d630550b5bbc6c59ae95bb739477b550b9

TISA-2007-09-Public.txt

Change Mirror Download


=========================================================================
Team Intell Security Advisory TISA2007-09-Public
-------------------------------------------------------------------------
Multiple improper file path handling issues
=========================================================================

Release date: 30.08.2007
Severity: Less critical
Impact: Privilege escalation
Remote: No
Disclosed by: Edi Strosar (Team Intell)


Summary:
========
The way Microsoft Windows handles filenames is well known
and documented. In situations where the path to executable
contains white space and is not enclosed in quotation
marks, it is possible to execute alternate application.
Microsoft certainly is aware of this issue, but they don't
consider it as a security related problem.

Applications that were found susceptible to unquoted
executable path issue a.k.a program.exe trick (from the
series "Quis custodiet ipsos custodes?"):


01.) A-squared Anti-Malware 3.0
Service: a-squared Anti-Malware Service
Image path: C:\Program Files\a-squared
Anti-Malware\a2service.exe
Account: Local System
Impact: Privilege escalation
Status: Patched
Vendor: http://www.emsisoft.com/

02.) A-squared Free 3.0
Service: a-squared Free Service
Image path: C:\Program Files\a-squared
Free\a2service.exe
Account: Local System
Impact: Privilege escalation
Status: Patched
Vendor: http://www.emsisoft.com/

03.) Ashampoo AntiVirus v1.40
Service: avGuard Service
Image path: C:\Program Files\Ashampoo\Ashampoo
AntiVirus\ashavsrv.exe
Account: Local System
Impact: Privilege escalation
Status: Unknown (contact the vendor for further
information)
Vendor: http://www.ashampoo.com/

04.) Comodo BOClean Anti-Malware 4.25
Service: BOClean Core Service
Image path: C:\Program
Files\Comodo\CBOClean\bocore.exe
Account: Local System
Impact: Privilege escalation
Status: Unknown (contact the vendor for further
information)
Vendor: http://www.comodo.com/

05.) Comodo Firewall v2.4
Service: Commodo Application Agent
Image path: C:\Program
Files\Comodo\Firewall\cmdagent.exe
Account: Local System
Impact: Privilege escalation
Status: Unknown (contact the vendor for further
information)
Vendor: http://www.personalfirewall.comodo.com/

06.) eScan Anti-Virus 9.0
Service: MicroWord Agent Service
Image path: C:\Program Files\Common
Files\MicroWord\Agent\mwaser.exe
Account: Local System
Impact: Privilege escalation
Status: Unknown (contact the vendor for further
information)
Vendor: http://www.mwti.net/

07.) eScan Virus Control 9.0
Service: MicroWord Agent Service
Image path: C:\Program Files\Common
Files\MicroWord\Agent\mwaser.exe
Account: Local System
Impact: Privilege escalation
Status: Unknown (contact the vendor for further
information)
Vendor: http://www.mwti.net/

08.) Ikarus Virus Utilities v1.0.56
Service: The Guard X Service
Image path: C:\Program Files\Ikarus\Virus
Utilities\Bin\guardxservice.exe
Account: Local System
Impact: Privilege escalation
Status: Unknown (contact the vendor for further
information)
Vendor: http://www.ikarus-software.at/

09.) iolo Antivirus
Service: iolo DMV Service
Image path: C:\Program
Files\iolo\Common\Lib\iolodmvsvc.exe
Account: Local System
Impact: Privilege escalation
Status: Unknown (contact the vendor for further
information)
Vendor: http://www.iolo.com/

10.) iolo Firewall
Service: iolo DMV Service
Image path: C:\Program
Files\iolo\Common\Lib\iolodmvsvc.exe
Account: Local System
Impact: Privilege escalation
Status: Unknown (contact the vendor for further
information)
Vendor: http://www.iolo.com/

11.) Norman Internet Control (Pro) v5.90
Service: Norman eLogger Service 6
Image path: C:\Program
Files\Norman\Npm\Bin\elogsvc.exe
Account: Local System
Impact: Privilege escalation
Status: Unknown (contact the vendor for further
information)
Vendor: http://www.norman.com/

12.) Norman Personal Firewall v1.42
Service: Norman Type-R
Image path: C:\Program
Files\Norman\Npm\Bin\npfsvice.exe
Account: Local System
Impact: Privilege escalation
Status: Unknown (contact the vendor for further
information)
Vendor: http://www.norman.com/

13.) Norman Virus Control (Pro) v5.90
Service: Norman eLogger Service 6
Image path: C:\Program
Files\Norman\Npm\Bin\elogsvc.exe
Account: Local System
Impact: Privilege escalation
Status: Unknown (contact the vendor for further
information)
Vendor: http://www.norman.com/

14.) Outpost Firewall Pro
Service: Outpost Firewall Service
Image path: C:\Program Files\Agnitum\Outpost
Firewall\outpost.exe
Account: Local System
Impact: Privilege escalation
Status: Unknown (contact the vendor for further
information)
Vendor: http://www.agnitum.com/

15.) Outpost Security Suite Pro
Service: Outpost Security Suite Service
Image path: C:\Program Files\Agnitum\Outpost
Security Suite\outpost.exe
Account: Local System
Impact: Privilege escalation
Status: Unknown (contact the vendor for further
information)
Vendor: http://www.agnitum.com/

16.) Quick Heal AntiVirus Plus 2007
Service: Quick Heal Firewall Service
Image path: C:\Program Files\Cat Computer\Quick Heal
Firewall Pro\qhfw.exe
Account: Local System
Impact: Privilege escalation
Status: Unknown (contact the vendor for further
information)
Vendor: http://www.quickheal.co.in/

17.) Quick Heal Total Security 2007
Service: Quick Heal Firewall Service
Image path: C:\Program Files\Cat Computer\Quick Heal
Firewall Pro\qhfw.exe
Account: Local System
Impact: Privilege escalation
Status: Unknown (contact the vendor for further
information)
Vendor: http://www.quickheal.co.in/

18.) Rising Antivirus 2007
Service: RsRavMon Service
Image path: C:\Program Files\Rising\Rav\ravmond.exe
Account: Local System
Impact: Privilege escalation
Status: Unknown (contact the vendor for further
information)
Vendor: http://www.rising-eu.de/

19.) Rising Firewall 2007
Service: Rising Personal Firewall Service
Image path: C:\Program Files\Rising\RFW\rfwsrv.exe
Account: Local System
Impact: Privilege escalation
Status: Unknown (contact the vendor for further
information)
Vendor: http://www.rising-eu.de/

20.) Trend Micro AntiVirus + AntiSpyware 2007
Service: Trend Micro AntiVirus Protection Service
Image path: C:\Program Files\Trend Micro\AntiVirus
2007\tavsvc.exe
Account: Local System
Impact: Privilege escalation
Status: Unknown (contact the vendor for further
information)
Vemdor: http://www.trendmicro.com/

21.) ViRobot Desktop 5.5
Service: Hauri Common Service
Image path: C:\Program
Files\Hauri\Common\hsvcmod.exe
Account: Local System
Impact: Privilege escalation
Status: Unknown (contact the vendor for further
information)
Vendor: http://www.globalhauri.com/

22.) Virus Chaser
Service: Virus Chaser Spider NT
Image path: C:\Program Files\Virus
Chaser\spidernt.exe
Account: Local System
Impact: Privilege escalation
Status: Unknown (contact the vendor for further
information)
Vendor: http://www.viruschaser.com.hk/eng/

23.) And the list goes on and on...


Limitations:
============
This conditions are difficult, if not impossible, to
exploit on Windows XP/2003/Vista. By default these
operating systems implement restrictive file permission
policy. Exploitation is limited to Microsoft Windows 2000
and to misconfigured ACLs cases.


References:
===========
http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dllproc/base/createprocess.asp
http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dllproc/base/createprocessasuser.asp


Solution:
=========
Some vendors released updates addressing this issue. The
"hot fix" is actually pretty simple: open Registry Editor
and place the ImagePath inside double quotes.


Timeline:
=========
10.08.2007 - initial vendors notification
20.08.2007 - additional vendors notification
30.08.2007 - public disclosure


Contact:
========
Maldin d.o.o.
Trzaska cesta 2
1000 Ljubljana - SI

tel: +386 (0)590 70 170
fax: +386 (0)590 70 177
gsm: +386 (0)31 816 400
web: www.teamintell.com
e-mail: info@teamintell.com


Disclaimer:
===========
The content of this report is purely informational and
meant for educational purposes only. Maldin d.o.o. shall
in no event be liable for any damage whatsoever, direct or
implied, arising from use or spread of this information.
Any use of information in this advisory is entirely at
user's own risk.

=========================================================================


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close