what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

outpostPwn.txt

outpostPwn.txt
Posted Jul 24, 2006
Authored by H. Wiedemann

All current available Outpost Firewall versions suffer from severe vulnerabilities that allow any local user to gain access to the LocalSystem account.

tags | exploit, local, vulnerability
SHA-256 | 9f8073aa2da59bd44cac7addf49e490496ffab3e3b2d4cdf2c8ed4fc8dfa123a

outpostPwn.txt

Change Mirror Download
Hi,

all current available "Outpost Firewall" versions do have severe
vulnerabilities, every local user is able to run programs under the very
high privileged LocalSystem account.

Steps to reproduce:

1.) create an empty text file (e.g. "empty.txt")
2.) create a batch file which will open a command shell.
sth. like:
cmd.exe
3.) open the Outpost Firewall GUI
4.) call one of the open or save file dialogs
e.g. "File - Load Configuration"
change the file type to "All Files *.*"
5.) drag the "empty.txt" and drop it over the created batch file
6.) a command shell opens running under the LocalSystem account
(you can check this with "whoami.exe" from the windows resource kit
tools)


There're of course a lot other drag&drop possibilites ... you could e.g.
drop the text file over "notepad.exe" which will open a notepad with
system privileges.

Even if Agnitum disables the Drag&Drop functionality: the open/save
dialog will always be able to read and write files with the rights of
the LocalSystem account. Thus every user could severely damage the system.


This vulnerability is by design, there're dozens of other possibilities
to gain system privileges with Outpost. The problem is that the GUI is
part of the windows service and is running with SYSTEM privileges. Even
MS says that the so called "Interactive Services" shouldn't be used -->
MSDN Library, topic "Interactive Services" - "Security Considerations
for Interactive Services".


--

H. WIEDEMANN

Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close