lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <B3BCAF4246A8A84983A80DAB50FE72427DE404@secnap2.secnap.com>
Date: Wed, 6 Dec 2006 08:23:18 -0500
From: "Michael Scheidell" <scheidell@...nap.net>
To: "lucretias" <lucretias@...w.ca>
Cc: <bugtraq@...urityfocus.com>
Subject: RE: Symantec LiveState Agent for Windows vulnerability - Local Privilege Escalation


> -----Original Message-----
> From: lucretias [mailto:lucretias@...w.ca] 
> Sent: Wednesday, December 06, 2006 7:56 AM
> To: Michael Scheidell
> Subject: RE: Symantec LiveState Agent for Windows 
> vulnerability - Local Privilege Escalation
> I think the issue is the process does not return in it's 
> previous sandbox.

So, do this, poc:

Log on to local machine as administrator.


Use IE:

BANG, you are using IE with elevated privledges.

This is stupid, and anyone who doesn't see how stupid this is isn't
listening.

Last free clue to anyone: if you don't understand this, and think this
is a security violation or if you think symantec needs to fix this, you
need to find a different job.  You will be chasing dragons when there is
real work to do.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ