exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

SopCast 3.4.7 Improper Permissions

SopCast 3.4.7 Improper Permissions
Posted Dec 5, 2011
Authored by LiquidWorm | Site zeroscience.mk

SopCast is vulnerable to an elevation of privileges vulnerability which can be used by a simple user that can change the executable file with a binary of choice. Version 3.4.7.45585 is affected.

tags | exploit
SHA-256 | 1715697722899e506bb604c388d1147e954711b184bb29cf08b590d58ca98864

SopCast 3.4.7 Improper Permissions

Change Mirror Download

SopCast 3.4.7 (Diagnose.exe) Improper Permissions


Vendor: SopCast.com
Product web page: http://www.sopcast.com
Affected version: 3.4.7.45585

Summary: SopCast is a simple, free way to broadcast video and audio or watch
the video and listen to radio on the Internet. Adopting P2P(Peer-to-Peer)
technology, It is very efficient and easy to use. SoP is the abbreviation for
Streaming over P2P. Sopcast is a Streaming Direct Broadcasting System based
on P2P. The core is the communication protocol produced by Sopcast Team, which
is named sop://, or SoP technology.

Desc: SopCast is vulnerable to an elevation of privileges vulnerability which
can be used by a simple user that can change the executable file with a binary
of choice. The vulnerability exist due to the improper permissions, with the 'F'
flag (full control) for the 'Everyone' group, for the 'Diagnose.exe' binary file
which is bundled with the SopCast installation package.

Tested on: Microsoft Windows XP Professional SP3 (EN)


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
@zeroscience


Vendor status:

[30.11.2011] Vulnerability discovered.
[01.12.2011] Contact with the vendor with sent detailed info.
[04.12.2011] No response from the vendor.
[05.12.2011] Public security advisory released.


Advisory ID: ZSL-2011-5062
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5062.php


30.11.2011

--


C:\Program Files\SopCast>cacls Diagnose.exe
C:\Program Files\SopCast\Diagnose.exe Everyone:F <-----
BUILTIN\Users:R
BUILTIN\Power Users:C
BUILTIN\Administrators:F
NT AUTHORITY\SYSTEM:F
LABPC\User101:F

C:\Program Files\SopCast>
Login or Register to add favorites

File Archive:

January 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    0 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    5 Files
  • 4
    Jan 4th
    5 Files
  • 5
    Jan 5th
    9 Files
  • 6
    Jan 6th
    5 Files
  • 7
    Jan 7th
    0 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    18 Files
  • 10
    Jan 10th
    31 Files
  • 11
    Jan 11th
    30 Files
  • 12
    Jan 12th
    33 Files
  • 13
    Jan 13th
    25 Files
  • 14
    Jan 14th
    0 Files
  • 15
    Jan 15th
    0 Files
  • 16
    Jan 16th
    7 Files
  • 17
    Jan 17th
    25 Files
  • 18
    Jan 18th
    38 Files
  • 19
    Jan 19th
    6 Files
  • 20
    Jan 20th
    21 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    24 Files
  • 24
    Jan 24th
    68 Files
  • 25
    Jan 25th
    22 Files
  • 26
    Jan 26th
    20 Files
  • 27
    Jan 27th
    17 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close