what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

NotSoGenius.txt

NotSoGenius.txt
Posted Apr 1, 2006
Authored by beford

Genius VideoCAM BN is susceptible to a local privilege escalation flaw.

tags | exploit, local
SHA-256 | c6a5fb176d590a289db5941aa235aa32e3610ef9d31ae14c0f34c7b8c0a3d29d

NotSoGenius.txt

Change Mirror Download
Software Vulnerable

Genius VideoCAM NB Driver
http://download.geniusnet.com.tw/CAMERA/webnb.zip

Other genius webcams with the same 'snapshot feature' might be
affected with the same issue, if you have any of those please try to
reproduce this issue.

Affects: Windows XP / Windows 2000

Proof of concept (omg leet)

http://img159.imageshack.us/img159/5351/pwnt6qq.png

Description

This vuln is very similar to MS04-019 [1] , when you press the
snapshot button on the webcam to take a picture, the snapshot viewer
window appears, the problem is that this application is running with
SYSTEM privileges,so you click file/save as, in the save as dialog you
browse to X:\windows\system32\, type *.exe in the file name, then just
right click and select open, a new shell with SYSTEM privileges
appears. As you can see on the screenshot, there are two cmd.exe
shells, one of those was started through the Run dialog, and the other
through this vuln. To check the user privileges, I used whoami.exe
from W32GnuUtils [2]


[1] http://www.microsoft.com/technet/security/bulletin/MS04-019.mspx
[2] http://unxutils.sourceforge.net/
[3] http://www.milw0rm.com/exploits/350 (example exploit ms04-019)

Vendor contacted
Vendor Response:

1. Regarding the privilige problem, the limited user only can open the
shell, they can't use another functions.

2. Regarding the privilege probelm, the limited user can open the shell but
can't use the functions provided by shell. It should be reasonable.
Moreover, the VideoCam NB has been phased out, our R&D won't pay more effort
to it unless usage bug.

Conclusion

I'm not sure what they mean with "can't use the functions provided by
shell". You only need to add a new admin user with the net command, or
use pwdump to dump the pw hashes, or just install a backdoor/rootkit.
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close