exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Panda Internet Security Binary Planting

Panda Internet Security Binary Planting
Posted Dec 4, 2012
Authored by Demetris Papapetrou, QSecure | Site qsecure.com.cy

Panda Internet Security versions 2012 and 2013 suffer from a binary planting privilege escalation vulnerability.

tags | advisory
SHA-256 | bb5e0bc6193168eed57fb6bbfba969ff0bf9390984a659efaec285d1a2979727

Panda Internet Security Binary Planting

Change Mirror Download
========================================================================
Privilege Escalation through Binary Planting in Panda Internet Security
========================================================================

Software: Panda Internet Security 2012 & 2013
Vendor: http://www.pandasecurity.com/
Vuln Type: Binary Planting Attack
Remote: No
Local: Yes
Discovered by: QSecure and Demetris Papapetrou
Website: http://www.qsecure.com.cy
Discovered: 09/09/2012
Reported: 19/11/2012
Disclosed: 04/12/2012
Vendor's Response: Automatically Generated Email
Vulnerability Reference: http://www.qsecure.com.cy/advisories/binary_planting_in_panda.html

VULNERABILITY DESCRIPTION:
==========================
As a result of an incorrect dynamic link library (DLL) loading in Panda Internet Security, an attacker with user level access to the machine can elevate

his/her privileges to SYSTEM.

This can be accomplished by planting a malicious DLL file in a writable folder that is part of the system's %PATH% variable. The malicious DLL is loaded when

the vulnerable Panda service or the system is restarted.

The following DLLs are insecurely loaded by Panda Internet Security 2013:

Insecure DLL Vulnerable Service
------------- ------------------
Pavshld.dll PsCtrls.exe, PsImSvc.exe, PavFnSvr.exe, PskSvc.exe
ImFilter.dll2 PsImSvc.exe
ImFilter.dll3 PsImSvc.exe
ImFilter.dll4 PsImSvc.exe

In addition to the above DLLs, Panda Internet Security 2012 also loads ham.dll insecurely.
Login or Register to add favorites

File Archive:

July 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    52 Files
  • 2
    Jul 2nd
    0 Files
  • 3
    Jul 3rd
    0 Files
  • 4
    Jul 4th
    11 Files
  • 5
    Jul 5th
    8 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    0 Files
  • 9
    Jul 9th
    0 Files
  • 10
    Jul 10th
    0 Files
  • 11
    Jul 11th
    0 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close