lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <B3BCAF4246A8A84983A80DAB50FE72427DE3F5@secnap2.secnap.com>
Date: Tue, 5 Dec 2006 07:40:59 -0500
From: "Michael Scheidell" <scheidell@...nap.net>
To: "ss_team" <ssteam.pl@...il.com>, <bugtraq@...urityfocus.com>
Cc: <security@...antec.com>
Subject: RE: Symantec LiveState Agent for Windows vulnerability - Local Privilege Escalation


> -----Original Message-----
> From: ss_team [mailto:ssteam.pl@...il.com] 
> Sent: Monday, December 04, 2006 11:28 AM
> To: bugtraq@...urityfocus.com
> Subject: Symantec LiveState Agent for Windows vulnerability - 
> Local Privilege Escalation
> 
> 
> hello,
> 
> we've found local privilege escalation in Symantec LiveState agent.
> 
> PoC:
> 
> 1. kill shstart.exe process

Wouldn't you have to be administrator to kill shstart.exe?


> 2. from symantec livestate agent icon in systray choose "Web 
> Self-Service"
> 3. New browser window will open, it is running with SYSTEM privileges.
> 
> tested on fully patched Win XP SP2, Symantec LiveState agent 7.1
> 
> 
> Credits: marc & shb
> 
> 
> -- 
> http://ssteam.ath.cx
> 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ