lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060716132316.26561.qmail@securityfocus.com> Date: 16 Jul 2006 13:23:16 -0000 From: mullware@...il.com To: bugtraq@...urityfocus.com Subject: Escalation of privileges in Outpost and Lavasoft Firewalls -Unusual ShellExecute behavior Vulnerable Products: Outpost Firewall Pro ver. 3.51.759.6511 (462) And Lavasoft Personal Firewall ver. 1.0.543.5722 (433) Summary of problem: The firewall runs its windows under a SYSTEM context. A user with lower privileges than SYSTEM could locate the (open folder) control on some of these windows, terminate the explorer.exe process and then click on the (open folder) control to open a SYSTEM owned explorer shell logging in right over the top of the previous user! for details see: http://www.ben.goulding.com.au/secad.html