exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Rising Products Local Privilege Escalation

Rising Products Local Privilege Escalation
Posted Oct 27, 2009
Authored by ShineShadow

Multiple Rising products suffers from a local privilege escalation vulnerability. These include, but are not limited to, Rising Antivirus 2009, Rising Internet Security 2009, and Rising Personal Firewall 2009.

tags | advisory, local
SHA-256 | 39c918aba278593ad4defd575cb088df7895aa20e2c5728c83d254c558ecdea8

Rising Products Local Privilege Escalation

Change Mirror Download
ShineShadow Security Report 28102009-13

TITLE

Rising Multiple Products Local Privilege Escalation Vulnerability

BACKGROUND

RISING has introduced a variety of operating system based antivirus software, firewall software and enterprise antivirus wall, firewall, network security warning system and other hardware products. RISING is the third company in the world and the only one in China to provide a full range of information security products and professional services.
RISING is catering to over 60 million personal users and more than 70,000 corporate customers in Asia, Europe and Northern America. RISING technology for the search of unknown computer viruses is recognized and protected by patents in Europe, Japan and the United States of America.

Source: http://www.rising-global.com

VULNERABLE PRODUCTS

Rising Antivirus 2009 (21.62.04)
Rising Internet Security 2009 (21.62.04)
Rising Personal Firewall 2009 (21.62.04)
Prior versions may also be affected.

DETAILS

Rising installs the own program files with insecure permissions (Users: Full Control). Local attacker (unprivileged user) can replace some files (for example, executable files of Rising services) by malicious file and execute arbitrary code with SYSTEM privileges. This is local privilege escalation vulnerability.
For example, in Rising Antivirus 2009 the following attack scenario could be used:
1. An attacker (unprivileged user) replaces one of the Rising Antivirus program files by malicious executable file. For example, the replacing file could be - %Program Files%\Rising\RAV\RavTask.exe (Rising RavTask Manager).
2. Restart the system.
After restart attackers malicious file will be executed with SYSTEM privileges.
Self-defense of the Rising Antivirus will prevent all operations with Rising program files. It can be bypassed using internal shell dialogs in the Rising Antivirus (for example, "Save as" dialog in Tools -> Installer Creation Tool -> Browse).
For other vulnerable Rising products similar attack scenario could be used.

EXPLOITATION

An attacker must have valid logon credentials to a system where vulnerable software is installed.

WORKAROUND

No workarounds

DISCLOSURE TIMELINE

31/08/2009 Initial vendor notification. Secure contacts requested.
31/08/2009 Vendor response
02/09/2009 Vulnerability details sent. Confirmation requested.
03/09/2009 Vendor accepted vulnerability for analysis
14/09/2009 Vendor response: "This issue is not a vulnerability. During program designing, Rising Virus Lab has known Rising program files could be modified by this way. However, few malware attacks Antivirus through the method. And, we have not detected any malware do this until now."
14/09/2009 I informed vendor about the possible attack scenarios. No reply.
17/09/2009 Resend message
17/09/2009 Vendor accepted information for analysis
06/10/2009 Planned disclosure date has been sent to vendor
10/10/2009 Vendor notified me that vulnerability will be fixed only in 2010 edition of the vulnerable products
12/10/2009 Query for the 2010 edition release date
12/10/2009 Vendor response that the release date is unknown
28/10/2009 Advisory released

CREDITS

Maxim A. Kulakov (ShineShadow)
ss_contacts[at]hotmail.com
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close