exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

pandais.txt

pandais.txt
Posted Sep 8, 2006
Authored by 3APA3A | Site security.nnov.ru

Panda Platinum Internet Security 2006/2007 suffers from multiple vulnerabilities. Insecure file permissions allow an unprivileged local user the ability to obtain system-level access or access to account of another logged on user. Insecure design of the spam filtering control engine allows remote attackers to control bayesian self learning spam filtering process using a malicious web page.

tags | advisory, remote, web, local, vulnerability
SHA-256 | 64bf6b4e76147fd07e6e28bffb2aa61bd8df71d79c186dd1e124d9eb55b2dbac

pandais.txt

Change Mirror Download

Noise:

We have more and more application to secure our networks. Does it means
network becomes more and more secure? No, there is a limit. Because
_any_ application has vulnerabilities. For in much security is much
grief: and he that increaseth code increaseth bugs [1].


Title: Panda Platinum Internet Security 2006/2007 privilege escalation
and bayesian filter control security vulnerabilities
Author: 3APA3A <3APA3A@security.nnov.ru>
http://www.security.nnov.ru/
Vendor: Panda Software
Product: Panda Platinum Internet Security 2006 10.02.01
Panda Platinum Internet Security 2007 11.00.00
Panda Antivirus was not tested
Category:
1. Local, privilege escalation (insecure file
permissions)
2. Remote, against client (bayesian filter control)
Rating: High (privilege escalation)
Low (bayesian filter control)
Advisory: http://www.security.nnov.ru/advisories/pandais.asp

Intro:

Panda Platinum Internet Security 2006/2007 is Internet security suite
(Antivirus, Personal Firewall, Antispam) from Panda Software.

Vulnerability:

1. Insecure file permissions allow unprivileged local user to obtain
system-level access or access to account of another logged on user.
2. Insecure design of SPAM filtering control engine allows remote
attacker to control bayesian self leaning SPAM filtering process from
malicious Web page.

Details:

1. During installation of Panda Platinum Internet Security 2006/2007
permissions for installation folder
%ProgramFiles%\Panda Software\Panda Platinum 2006 Internet Security\
or
%ProgramFiles%\Panda Software\Panda Platinum 2007 Internet Security\
by default are set to Everyone:Full Control without any warning. Few
services (e.g. WebProxy.exe for Platinum 2006 or PAVSRV51.EXE for
Platinum 2007) are started from this folder. Services are started under
LocalSystem account. There is no protection of service files. It's
possible for unprivileged user to replace service executable with the
file of his choice to get full access with LocalSystem privileges. Or to
get privileges or any user (including system administrator) who logons
to vulnerable host. This can be exploited as easy as:

a. Rename WebProxy.exe (for Platinum 2006 or another service for
Platinum 2007, because under 2007 WebProxy.exe is not executed
as a service) to WebProxy.old in Panda folder
b. Copy any application to WebProxy.exe
c. Reboot

Upon reboot trojaned application will be executed with LocalSystem
account.

2. To manage SPAM filtering for messages received with POP3, Panda
starts Web server on the interface 127.0.0.1 with port 6083 and adds
text like
---------------------------------------------------------------------------------------------------
Text inserted by Platinum 2007:

This message has NOT been classified as spam. If it is unsolicited mail (spam), click on the following link to reclassify it: http://127.0.0.1:6083/Panda?ID=pav_8&SPAM=true
---------------------------------------------------------------------------------------------------
By clicking the link user can classify message as a spam or not.
ID=pav_XXX parameters contains ID of the message, where XXX is
sequential message number. On reply, this message is not filtered or
erased.
First, it leaks information about correspondence flow user has.
Second, it's possible for malicious Web page to use something like
[IMG SRC="http://127.0.0.1:6083/Panda?ID=pav_8&SPAM=true"]
[IMG SRC="http://127.0.0.1:6083/Panda?ID=pav_9&SPAM=true"]
[IMG SRC="http://127.0.0.1:6083/Panda?ID=pav_10&SPAM=true"]
It will cause incorrect message classification as a SPAM and will lead
to unpredictable filter behavior. There is no way to flush bayesian
filter state.

Vendor:

11.08.2006 Panda Software was contacted via support@pandasoftware.com,
secure@pandasoftware.com, security@pandasoftware.com, support@viruslab.ru
15.08.2006 support@viruslab.ru (Panda Software Russia) was contacted in Russian
16.08.2006 Response from Panda Software Russia
16.08.2006 Additional details sent to Panda Software Russia
17.08.2006 Panda Software launches Panda Internet Security 2007 which
suffers from the same vulnerabilities

References:
1. Ecc 1:18



--
http://www.security.nnov.ru
/\_/\
{ , . } |\
+--oQQo->{ ^ }<-----+ \
| ZARAZA U 3APA3A } You know my name - look up my number (The Beatles)
+-------------o66o--+ /
|/

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close