首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Zend Optimizer 3.3.3 (Windows) Insecure Permissions
来源:vfocus.net 作者:LiquidWorm 发布时间:2012-04-05  
Zend Optimizer 3.3.3 (Windows) Insecure Permissions


Vendor: Zend Technologies Ltd.
Product web page: http://www.zend.com

Affected version: 3.3.3* and 3.3.0*

* Note: The patch did not change the version number of the affected
product, so the updated version is still 3.3.3, but with proper permissions.

Summary: Zend Optimizer is a free application that runs the files
encoded using Zend Guard and enhances the overall performance of
your PHP applications.

Desc: The Zend Optimizer package for Windows is vulnerable to an
elevation of privileges vulnerability which can be used by a simple
user that can change the library file with a binary of choice. The
vulnerability exist due to the improper permissions, with the 'F' flag
(full control) for the 'Everyone' group, for the 'ZendExtensionManager.dll'
library file and 'ZendOptimizer.dll' which are bundled with the Zend
Optimizer (Runtime for PHP 5.2 and earlier) installation package.

Tested on: Microsoft Windows XP Professional SP3 (EN)


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
                            @zeroscience


Vendor status:

[01.02.2012] Vulnerability discovered.
[23.02.2012] Contact with the vendor.
[23.02.2012] Vendor responds asking for details.
[24.02.2012] Sent detailed information to the vendor.
[24.02.2012] Vendor assigns appropriate team for coordination.
[27.02.2012] Vendor is analyzing the issue, working on a fix.
[27.02.2012] Asked vendor for confirmation and scheduled patch release date.
[28.02.2012] Vendor replies with confirmation of the issue.
[05.03.2012] Asked vendor for status update.
[06.03.2012] Vendor created fix for the issue, promising patch release date.
[07.03.2012] Sent coordination details to the vendor.
[14.03.2012] Asked vendor for status update.
[14.03.2012] Vendor replies.
[21.03.2012] Sent advisory release information to the vendor.
[21.03.2012] Vendor extends the patch release date.
[29.03.2012] Vendor publishes new version to address this issue.
[03.04.2012] Coordinated public security advisory released.



Advisory ID: ZSL-2012-5083
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5083.php

Zend Advisory: http://static.zend.com/topics/Zend-Optimizer-3.3.3-Release-Notes-V2.txt
               http://www.zend.com/en/products/guard/downloads



01.02.2012


---

C:\Program Files\Zend\ZendOptimizer-3.3.0\lib>cacls ZendExtensionManager.dll
C:\Program Files\Zend\ZendOptimizer-3.3.0\lib\ZendExtensionManager.dll Everyone:F
                                                                       BUILTIN\Users:R
                                                                       BUILTIN\Power Users:C
                                                                       BUILTIN\Administrators:F
                                                                       NT AUTHORITY\SYSTEM:F
                                                                       TESTPC\TESTUSER:F


C:\Program Files\Zend\ZendOptimizer-3.3.0\lib>cd Optimizer-3.3.0\php-5.2.x

C:\Program Files\Zend\ZendOptimizer-3.3.0\lib\Optimizer-3.3.0\php-5.2.x>cacls ZendOptimizer.dll
C:\Program Files\Zend\ZendOptimizer-3.3.0\lib\Optimizer-3.3.0\php-5.2.x\ZendOptimizer.dll Everyone:F
                                                                                          BUILTIN\Users:R
                                                                                          BUILTIN\Power Users:C
                                                                                          BUILTIN\Administrators:F
                                                                                          NT AUTHORITY\SYSTEM:F
                                                                                          TESTPC\TESTUSER:F


C:\Program Files\Zend\ZendOptimizer-3.3.0\lib\Optimizer-3.3.0\php-5.2.x>

---

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Trend Micro Internet Security
·BlazeVideo HDTV Player 6.6 Pro
·K-Lite Mega Codec Pack 5.7.0 (
·Sysax <= 5.57 Directory Traver
·WM Downloader 3.1.2.2(.pls) Bu
·NetOp Remote Control Client 9.
·SnackAmp 3.1.3 Malicious aiff
·Xion Audio Player 1.0.127 (.ai
·Denial of Service in FoxPlayer
·RichTx32.OCX (TextBox Control
·Mini-stream Ripper [.m3u] 3.1.
·Microsoft Windows Media Player
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved