首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
SopCast 3.4.7 (Diagnose.exe) Improper Permissions
来源:http://www.zeroscience.mk 作者:LiquidWorm 发布时间:2011-12-06  

SopCast 3.4.7 (Diagnose.exe) Improper Permissions


Vendor: SopCast.com
Product web page: http://www.sopcast.com
Affected version: 3.4.7.45585

Summary: SopCast is a simple, free way to broadcast video and audio or watch
the video and listen to radio on the Internet. Adopting P2P(Peer-to-Peer)
technology, It is very efficient and easy to use. SoP is the abbreviation for
Streaming over P2P. Sopcast is a Streaming Direct Broadcasting System based
on P2P. The core is the communication protocol produced by Sopcast Team, which
is named sop://, or SoP technology.

Desc: SopCast is vulnerable to an elevation of privileges vulnerability which
can be used by a simple user that can change the executable file with a binary
of choice. The vulnerability exist due to the improper permissions, with the 'F'
flag (full control) for the 'Everyone' group, for the 'Diagnose.exe' binary file
which is bundled with the SopCast installation package.

Tested on: Microsoft Windows XP Professional SP3 (EN)


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
                            @zeroscience


Vendor status:

[30.11.2011] Vulnerability discovered.
[01.12.2011] Contact with the vendor with sent detailed info.
[04.12.2011] No response from the vendor.
[05.12.2011] Public security advisory released.


Advisory ID: ZSL-2011-5062
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5062.php


30.11.2011

--


C:\Program Files\SopCast>cacls Diagnose.exe
C:\Program Files\SopCast\Diagnose.exe Everyone:F <-----
                                      BUILTIN\Users:R
                                      BUILTIN\Power Users:C
                                      BUILTIN\Administrators:F
                                      NT AUTHORITY\SYSTEM:F
                                      LABPC\User101:F

C:\Program Files\SopCast>


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·SopCast 3.4.7 sop:// URI Handl
·Ability Server 2.34 STOR Comma
·ShareCenter D-Link DNS-320 Rem
·Family Connections less.php Re
·ms11-046 webshell 下exp 自己加
·Traq <= 2.3 Authentication Byp
·SMF <= 2.0.1 SQL Injection, Pr
·Family Connections CMS v2.5.0-
·HP Application Lifestyle Manag
·linux/x86-64 execve(/bin/sh) 5
·JavaScript Switcharoo Proof Of
·NJStart Communicator MiniSmtp
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved