首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Symantec pcAnywhere Insecure File Permissions Local Privilege Escalation
来源:edward.torkington@ngssecure.com 作者:Edward 发布时间:2012-05-03  

=======
Summary
=======
Name: Symantec pcAnywhere insecure file permissions local privilege escalation
Release Date: 30 April 2012
Reference: NGS00117
Discoverer: Edward Torkington <edward.torkington@ngssecure.com>
Vendor: Symantec
Vendor Reference:
Systems Affected:

Symantec pcAnywhere 12.5.x
IT Management Suite 7.0 pcAnywhere Solution 12.5.x
IT Management Suite 7.1 pcAnywhere Solution 12.6.x

Risk: High
Status: Fixed

========
TimeLine
========
Discovered: 23 August 2011
Released: 14 September 2011
Approved: 14 September 2011
Reported: 23 August 2011
Fixed: 24 January 2012
Published: 30 April 2012

===========
Description
===========

Inadequate file permissions on application binaries could result on local privilege escalation

=================
Technical Details
=================
A number of key files in the C:\Program Files\Symantec\pcAnywhere\ folder are writable by any user:

C:\Program Files\Symantec\pcAnywhere\WinAw32.exe Everyone:(OI)(CI)F
                                                NT
AUTHORITY\SYSTEM:(OI)(CI)F

C:\Program Files\Symantec\pcAnywhere\awrem32.exe Everyone:(OI)(CI)F
                                                NT
AUTHORITY\SYSTEM:(OI)(CI)F

C:\Program Files\Symantec\pcAnywhere\awhost32.exe Everyone:(OI)(CI)F
                                                 NT
AUTHORITY\SYSTEM:(OI)(CI)F

It is trivial to replace these .exe (including the main pcanywhere exe, winaw32.exe with a malicious binary). When launched by the admin, privilege escalation would be gained. The awhost32.exe is set as a service under some scenarios (SYSTEM) and allows a user to privilege escalate by overwriting this binary.

===============
Fix Information
===============

An updated version of the software has been released to address these vulnerabilities:
http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security
_advisory&pvid=security_advisory&year=2012&suid=20120124_00


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·OpenConf <= 4.11 (author/edit.
·VLC MMS Stream Handling Buffer
·Microsoft Windows xp Win32k.sy
·AnvSoft Any Video Converter 4.
·Format Factory v2.95 - Buffer
·Solarwinds Storage Manager 5.1
·Solarwinds Storage Manager 5.1
·PHP CGI Argument Injection
·Mikrotik Router Denial of Serv
·PHP CGI Argument Injection Exp
·LAN Messenger <= v1.2.28 Denia
·Mozilla Firefox <=12.0 Denial
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved