exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 38917

Secunia Security Advisory 38917
Posted Mar 11, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luka Milkovic has reported some vulnerabilities in SUPERAntiSpyware, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain escalated privileges.

tags | advisory, denial of service, local, vulnerability
SHA-256 | 5c1d12e732ea088f60d359525fb61ebc40f7c1a4b1b9eb0a3a23d31b8412b01c

Secunia Security Advisory 38917

Change Mirror Download
----------------------------------------------------------------------


Use WSUS to deploy 3rd party patches

Public BETA
http://secunia.com/vulnerability_scanning/corporate/wsus_3rd_third_party_patching/


----------------------------------------------------------------------

TITLE:
SUPERAntiSpyware Multiple Vulnerabilities

SECUNIA ADVISORY ID:
SA38917

VERIFY ADVISORY:
http://secunia.com/advisories/38917/

DESCRIPTION:
Luka Milkovic has reported some vulnerabilities in SUPERAntiSpyware,
which can be exploited by malicious, local users to cause a DoS
(Denial of Service) or gain escalated privileges.

1) The SASENUM.sys kernel driver passes user-space pointers in calls
to e.g. ZwQueryObject(). This can be exploited to cause a
NULL-pointer dereference and crash an affected system via specially
crafted IOCTLs.

2) A boundary error exists in SASKUTIL.sys when processing user-space
registration requests. This can be exploited to cause a buffer
overflow with process ID values and cause a system crash.

3) An error exists in SASKUTIL.sys when processing
IOCTL_SABKUTIL_ZWOPENPROCESS requests. This can be exploited to
corrupt kernel memory and cause a system crash via invalid parameters
passed to ZwOpenProcess().

4) The SASKUTIL.sys driver passes user-mode parameters to the
ZwQueryValueKey() function. This can be exploited to overwrite
arbitrary memory and potentially gain escalated privileges via a
specially crafted IOCTL_SABKUTIL_QUERY_VALUE request.

5) The SASKUTIL.sys driver provides wrappers against registry and
file functions. This can be exploited to read arbitrary files and
registry keys, and modify arbitrary registry keys via specially
crafted IOCTLs.

6) SASKUTIL.sys allows unrestricted access to the
SetVistaTokenInformation() function. This can be exploited to cause a
crash or gain escalated privileges via a specially crafted
IOCTL_SABKUTIL_SET_VISTA_TOKEN_INFORMATION request.

7) An error in SASKUTIL.sys can be exploited to gain escalated
privileges via a specially crafted
IOCTL_SABKUTIL_SET_VISTA_PRIVILEGES_FOR_CURRENT_PROCESS request.

The vulnerabilities are reported in version 4.33.1000. Other versions
may also be affected.

SOLUTION:
Update to version 4.34.1000, which fixes some of the
vulnerabilities.

Restrict local access to trusted users only.

PROVIDED AND/OR DISCOVERED BY:
Luka Milkovic

ORIGINAL ADVISORY:
http://archives.neohapsis.com/archives/fulldisclosure/2010-03/0195.html

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close