what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Emsisoft Privilege Escalation

Emsisoft Privilege Escalation
Posted Nov 17, 2016
Authored by Stefan Kanthak

In an attempt to address DLL hijacking issues, Emsisoft has introduced additional security issues.

tags | advisory
systems | windows
SHA-256 | 3adced441acb8daaa8e7985e221c41156766e4a6efbf1c4eb4fa72158ea75f09

Emsisoft Privilege Escalation

Change Mirror Download
Hi @ll,

in response to <http://seclists.org/fulldisclosure/2016/Jan/24>
EmsiSoft fixed some of the DLL hijacking vulnerabilities in some
of their executable installers and unpackers.

EmsisoftEmergencyKit.exe still has beginner's errors which allow
escalation of privilege for EVERY local user:

0. while the self-extracting WinRAR archive EmsisoftEmergencyKit.exe
doesn't load DLLs from its "application directory" any more, its
payload but shows this vulnerability!

1. due to "requireAdministrator" in its application manifest the
self-extractor runs with administrative rights, although it
neither needs them nor uses them.

2. it creates the directory "%SystemDrive%\EEK" and unpacks its
payload into it.

JFTR: since it runs with administrative rights the self-
extractor could create "%SystemDrive%\EEK" with an ACL
that only allows write-access for administrators, or
use "%ProgramFiles%\EmsiSoft\Emergency Kit" instead.

This directory inherits the ACL of its parent, %SystemDrive%,
which allows write access for unprivileged users; they can thus
modify all files extracted there or add files, for example a
"%SystemDrive%\EEK\Version.dll".

Also give NetAPI32.dll, NetUtils.dll, SrvCli.dll, WksCli.dll,
PropSys.dll, AppHelp.dll, NTMarta.dll, Secur32.dll, MPR.dll and
CSCAPI.dll a try.

3. the programs "%SystemDrive%\EEK\Start Commandline Scanner.exe"
and "%SystemDrive%\EEK\Start Emergency Kit Scanner.exe" have
"requireAdministrator" in their application manifests too: they
load and execute the DLLs named above from "%SystemDrive%\EEK"
with administrative rights.

4. the other programs extracted to "%SystemDrive%\EEK\bin32" and
"%SystemDrive%\EEK\bin64" and are also run with administrative
rights.

5. of course the programs in "%SystemDrive%\EEK\bin32" and
"%SystemDrive%\EEK\bin64" load and execute DLLs from their
"application directory" (which is writable for everyone) too.

And one more:

6. the OpenSSL libraries shipped are from version 1.0.2d and have
multiple vulnerabilities which have beed fixed in version 1.0.2j.


stay tuned
Stefan Kanthak


Timeline:
~~~~~~~~~

2016-08-29 vulnerability report sent to vendor

2016-08-29 vendor acknowledges vulnerability, promises to update
at least the OpenSSL libraries, and ask the author of
WinRAR to add a directive to protect the created EEK
directory

2016-11-17 vendor fixed NOTHING in the past ELEVEN weeks, and
does not react any more -> report published
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close