exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

pstoolsVuln.txt

pstoolsVuln.txt
Posted Jul 21, 2004
Authored by Alan Ridgeway | Site www3.ca.com

Due to a vulnerability in the Sysinternals PsTools share mapping, an attacker with a user account can execute arbitrary code as an administrator.

tags | advisory, arbitrary
SHA-256 | afa2b3db99139b18f9779cb16ab7ebf5920c2aaf5e39becbcf6b41bd48024acf

pstoolsVuln.txt

Change Mirror Download
  Sysinternals PsTools utilities share mapping vulnerability

*Date Discovered: *July 15, 2004
*Date Published: *July 15, 2004
*Last Updated: *July 15, 2004


Vulnerability Description

*Vulnerability ID: *28304
*Discovered by: *Alan Ridgeway of Computer Associates
*Exploitable Locally: *No
*Exploitable Remotely: *Yes
*Impact: *An attacker with a user account can execute arbitrary code as administrator on a remote machine.

*Root Cause: *Insecure Design


Sysinternals PsTools utilities contain a vulnerability which allows a
local attacker to gain privileged access on a remote host. Several
PsTool utilities map the IPC$ or ADMIN$ share to execute a command on a
remote host. However, the PsTool utilities do not disconnect from the
IPC$ or ADMIN$ share when the program exits. An attacker can use the
existing share mapping to take administrative actions on a remote
machine. In order to exploit the issue, an affected PsTools utility must
first be successfully run on a remote host by a legitimate user and the
user must not reboot the host or logoff. This is a non-priority
technology vulnerability.

Recommendations <#recommendations>
Affected Technologies <#affected>
References <#references>


Recommendations

Sysinternals PsTools

Upgrade to version 2.05 or later.

http://www.sysinternals.com/ntw2k/freeware/pstools.shtml

PsExec:

Upgrade to version 1.54 or later.

http://www.sysinternals.com/ntw2k/freeware/psexec.shtml

PsGetsid

Upgrade to version 1.41 or later.

http://www.sysinternals.com/ntw2k/freeware/psgetsid.shtml

PsInfo

Upgrade to version 1.61 or later.

http://www.sysinternals.com/ntw2k/freeware/psinfo.shtml

PsKill

Upgrade to version 1.03 from PsTools 2.05 or later.

http://www.sysinternals.com/ntw2k/freeware/pskill.shtml

PsList

Upgrade to version 1.26 or later.

http://www.sysinternals.com/ntw2k/freeware/pslist.shtml

PsLoglist

Upgrade to version 2.51 or later.

http://www.sysinternals.com/ntw2k/freeware/psloglist.shtml

PsPasswd

Upgrade to version 1.21 from PsTools 2.05 or later.

http://www.sysinternals.com/ntw2k/freeware/pspasswd.shtml

PsService

Upgrade to version 2.12 or later.

http://www.sysinternals.com/ntw2k/freeware/psservice.shtml

PsSuspend

Upgrade to version 1.05 or later.

http://www.sysinternals.com/ntw2k/freeware/pssuspend.shtml

PsShutdown

Upgrade to version 2.32 or later.

http://www.sysinternals.com/ntw2k/freeware/psshutdown.shtml

Alternatively, use the following workaround solutions

1) After running an affected pstool, type "net use" to see the
mapping to IPC$ or ADMIN$. Delete the mapping with:

net use \\\IPC$ /delete

or

net use \\\ADMIN$ /delete

2) Logoff the user or reboot the machine

Return to top <#top>

Affected Technologies

Sysinternals: psexec 1.52
Sysinternals: psgetsid 1.4
Sysinternals: psinfo 1.5
Sysinternals: pskill 1.03
Sysinternals: pslist 1.25
Sysinternals: psloglist 2.5
Sysinternals: pspasswd 1.21
Sysinternals: psservice 2.1
Sysinternals: psshutdown 2.31
Sysinternals: pssuspend 1.04
Sysinternals: PsTools 2.01
Sysinternals: PsTools 2.02
Sysinternals: PsTools 2.03

Return to top <#top>

References

Mitre CVE: MAP-NOMATCH
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close