exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ncpVPNPKI.txt

ncpVPNPKI.txt
Posted Mar 3, 2006
Authored by Ramon Kukla

The NCP VPN/PKI client version 8.11 Build 146 is susceptible to local privilege escalation and denial of service attacks.

tags | advisory, denial of service, local
SHA-256 | 5c13a105224920a1c8a00b498f7b74baef8dc35f45afc18cdf36abd56dec10f7

ncpVPNPKI.txt

Change Mirror Download
Application: NCP VPN/PKI Client
Site: http://www.ncp.de
Version: 8.11, Build 146 and maybe lower
OS: Windows
Bugs: Local Privilige Escalation, DoS and other


Product:
========
NCP's Secure Communications provides a comprehensive portfolio of
products for implementing total solutions for high-security remote
access. These software-based products comply fully with all current
major technology standards for communication and encryption, as defined
by the IETF (Internet Engineering Task Force) and ITU (International
Telecommunication Union). Consequently all products can be smoothly
integrated into any existing network and communication architectures.
Your Internet infrastructure, which may already consist of third-party
security and access components, can be further used without changes ?
thus avoiding any unnecessary administrative costs.



About:
======

I found a few Bugs/Problems in the NCP VPN/PKI Client. If you read this
post you probably notice that this list of errors and bugs is just the
result of some really short tests. I'm *really* sure that there are
still some nice bugs.



1.: - Unnamed
===============================
If you create a rule using the Client Firewall you're able to bind an
application to this rule. Unfortunately no hash value (for instance)
will be created for this application. So you can easily pick another
application, put it into the directory, rename it and use it with this
rule.


VENDOR RESPONSE:
NCP is aware about this problem. A later version of the client will
come with a hash-function.



2.: - Buffer Overflow with Privilege Escalation (some sort of), DoS
===================================================================
Some of the installed applications didn't like it to start with a large
amount of arguments.

example 1:
In my current test-configuration I'm not able to go to or configure
'IPSec' in the menu 'configuration'. If I run 'ncpmon.exe' with >=261
characters I get a slightly different gui. And it's not only the gui
which is different. Now I'm able to go to the 'IPSec' menu and
configure the settings.

example 2:
Run 'ncprwsnt.exe' with enough arguments and your cpu utilization will
raise 100%.


VENDOR RESPONSE:
NCP is currently checking this problem(s).



3: - DoS, remote
================
I picked the first DoS code I found, tried it and was surprised that
this old piece of code is still working. Using the 'ZoneAlarm remote
Denial Of Service exploit'[1] it's possible to raise the memory usage
and the cpu utilization. Let it run for 1-2 minutes and you will notify
the decreasing speed of your machine. And at least it's possible to
make it impossible for you to continue working with the pc.


VENDOR RESPONSE:
NCP is currently checking this problem(s).



4: - Local Privilege Escalation
===============================
One feature of the client is that you can execute a script called
'connect.bat' after you established a connection with your vpn-gateway.
The script isn't executed by the client, but by the service 'ncprwsnt'
which runs with the local system account. So add a little script in the
program dir of the NCP VPN/PKI Client with a nice 'net user /add' and
'net localgroup /add' mix to escalate your privileges.


VENDOR RESPONSE:
This 'Feature' is known to NCP. A couple of customers are using exactly
this functionality. A new relase of the NCP VPN/PKI Client, which will
arrive in the next few weeks, will fix this 'problem'.



History:
========
2006-02-13: Found the Bugs
2006-02-15: Mailed the vendor
2006-02-16: The vendor replied



Thanks to the really nice and cool support from ncp :)

ports

[1] http://cert.uni-stuttgart.de/archive/bugtraq/2003/09/msg00020.html

--
SYS 64767
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close