what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

SRT2004-01-17-0425.txt

SRT2004-01-17-0425.txt
Posted Jan 21, 2004
Authored by Kevin Finisterre | Site secnetops.com

Secure Network Operations Advisory SRT2004-01-17-0425 - Ultr@VNC, the client/server software that allows you to remotely control a computer over any TCP/IP connection, has a faulty ShellExecute() statement that allows a local attacker to gain SYSTEM access.

tags | advisory, local, tcp
SHA-256 | f28f3ed6c815915416535420f36bf7ce30645cb63ebc9a1df339d53450bf5b4b

SRT2004-01-17-0425.txt

Change Mirror Download
Secure Network Operations, Inc.             http://www.secnetops.com/research
Strategic Reconnaissance Team research[at]secnetops[.]com
Team Lead Contact kf[at]secnetops[.]com
Spam Contact `rm -rf /`@snosoft.com

Our Mission:
************************************************************************
Secure Network Operations offers expertise in Networking, Intrusion
Detection Systems (IDS), Software Security Validation, and
Corporate/Private Network Security. Our mission is to facilitate a
secure and reliable Internet and inter-enterprise communications
infrastructure through the products and services we offer.

To learn more about our company, products and services or to request a
demo of ANVIL FCS please visit our site at http://www.secnetops.com, or
call us at: 978-263-3829


Quick Summary:
************************************************************************
Advisory Number : SRT2004-01-17-0425
Product : Ultr@VNC
Version : 1.0.0 RC11 (tested)
Vendor : http://ultravnc.sourceforge.net/
Class : Local
Criticality : High (to Ultr@VNC users)
Operating System(s) : Win32


Notice
************************************************************************
1-2 day Early Warning List:
---------------------------
Secure Network Operations, inc. will very shortly have its own advisory
notification mailing list. This list will notify you of advisories 1-2
days in advance of public release to other mailing lists. To subscribe
please visit http://advisories.secnetops.com in the immediate future.

30-60 day Early Warning List:
-----------------------------
Our early warning service will notify you of new vulnerabilities 30-60
days in advance of public release. This service has been created to protect
companies by allowing them to repair security vulnerabilities before they
become public knowledge. To purchase a one year subscription to this
service please contact us at 978-263-3767.

Alert
***********************************************************************
Our advisories will contain full details excluding a working Proof of
Concept. Our web page will contain our working proof of concept for the
advisory if it exists. Yes folks this is a policy change for us. We
will exercise our own disgression in regards to delay of exploit release
vs advisory release. List subscribers will have advanced access to working
proof of concept code depending on the severity and list subscription type.

Basic Explanation
************************************************************************
High Level Description : Ultr@VNC provides local SYSTEM access.

What to do : remove faulty ShellExecute() statements.

Basic Technical Details
************************************************************************
Proof Of Concept Status : SNO has Proof of Concept.

Low Level Description : Ultr@VNC is a client/server software that allows
you to remotely control a computer over any TCP/IP connection as if you
were in front of it. It is Free and distributed under the terms of the GNU
General Public License. Ultr@VNC supports Win9x/Me/NT4/Win2000/XP.

[kfinisterre@CloneRiot Ultravnc]$ grep ShellExecute . -rn
./src/ultravnc/winvnc/winvnc/vncmenu.cpp:423: ShellExecute(GetDesktopWindow(),
"open", "http://ultravnc.sourceforge.net/help.htm", "", 0, SW_SHOWNORMAL);
./src/ultravnc/winvnc/winvnc/vncmenu.cpp:426: ShellExecute(GetDesktopWindow(),
"open", "http://ultravnc.sourceforge.net/index.html", "", 0, SW_SHOWNORMAL);
Binary file ./winvnc.exe matches
Binary file ./french/winvnc.exe matches

In order to exploit this issue you simply need to right click on the tray
icon for Ultr@VNC, select either "Online Help" or "Home Page". You will
find that IEXPLORE.EXE is running as SYSTEM. You can simply type in the
address bar "C:\WINNT\SYSTEM32" and press enter. Locate cmd.exe and right
click on it and selece Open. At this point in time you will have a command
prompt running as SYSTEM.

An example of exploitation can be viewed (without registration) at:
http://www.secnetops.biz/images/SRT2004-01-17-0425.jpg

Vendor Status : Vendor is working on a fix for this issue. A vendor
supplied patch should be supplied in the next release.

Work Around : Comment out the ShellExecute() statements on both
line 423 and 426 of vncmenu.cpp. Recompile and reinstall the app.

Bugtraq URL : To be assigned.

Disclaimer
----------------------------------------------------------------------
This advisory was released by Secure Network Operations,Inc. as a matter
of notification to help administrators protect their networks against
the described vulnerability. Release of exploit code is done at our
own disgression.
----------------------------------------------------------------------
All content of this advisory is property of Secure Network Operations.
----------------------------------------------------------------------
Secure Network Operations, Inc. || http://www.secnetops.com
"Embracing the future of technology, protecting you."



Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close