what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

vcasel.htm

vcasel.htm
Posted Jan 22, 2000
Site oliver.efri.hr

Vcasel (Visual Casel) is apparently intended as some sort of addon to Novell Netware 3.X and above. The program does succeed in limiting the names of the files executed, but there is no path verification.

tags | exploit
SHA-256 | 1afd8be0e8218ce48904ec923ced26cfb2a7d6b7676222d7ce79c396c4c63c18

vcasel.htm

Change Mirror Download
<!DOCTYPE HTML PUBLIC "html.dtd">
<HTML>
<BODY BGCOLOR="#000000" TEXT="#FFFFFF"><PRE>
<FONT COLOR="#CC0000">COMMAND</FONT>

Vcasel (Visual Casel)

<FONT COLOR="#CC0000">SYSTEMS AFFECTED</FONT>

VCasel 3.0 (Win95)

<FONT COLOR="#CC0000">PROBLEM</FONT>

Vcasel (Visual Casel) is a program released by Computer Power
Solutions of Illinois which is apparently intended as some sort
of addon to Novell Netware 3.X and above. What VCasel is supposed
to do, or is advertised to do is provide a nice GUI for network
admins to secure and maintain a LAN with ease and provide each
user with a customized(unalterable) desktop. The program boasts
that with VCasel there is no longer a need for "access control,
policy files or profiles." This program also says that it can
prevent users from executing files not specified by the Admin.
It also does more, but I am entirely to lazy to list the rest of
its features. xDeath found this vulnerability.

Vcasel uses fails to successfully limit or prevent the execution
of "un-approved files." The program does succeed in limiting the
names of the files executed, but there is no path verification.
For example, if an admin said user JohnDoe could execute
write.exe, the admin isn't specifying c:\windows\write.exe, just
the binary write.exe. Now JohnDoe decides that he is getting
bored on the network so he goes off and finds his favorite game
online(pong.exe and downloads it to his home directory on H:
(total different drive and path then write.exe). He firsts tries
to execute pong.exe from his available drives folder and sees an
"Unauthorized Executable" message window pop up on his screen.
Next John decides to re-download the game, but this time name it
something different, he chooses to name it(when prompted by
client) write.exe, but he saves it to his home directory. He
once again tried to run it from his available drives folder and
w00p! it started up. Now sure, one person running a game of
some sort isn't that big of a deal, but think of the
possibilities. What if he renamed another, far more malicious
file write.exe? xDeath tested several executables with this hole
and was able to load a login/password logger from a normal user
account that would start on boot-up. Also, from a normal user he
was able to view and change files/directories/drives that were
specified as hidden and "unaccessible" thru VCasel by simply
copying and renaming File Manager. The ramifications are
practically endless.

<FONT COLOR="#CC0000">SOLUTION</FONT>

No fix/patch is presently available.
</PRE></BODY>
</HTML>
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close