lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <462CA938.7080502@reversemode.com>
Date: Mon, 23 Apr 2007 14:40:24 +0200
From: Reversemode <advisories@...ersemode.com>
To: Securityfocus <bugtraq@...urityfocus.com>
Subject: [Reversemode advisory] CheckPoint Zonelabs - ZoneAlarm SRESCAN driver
 local privilege escalation

	  CHECK POINT ZONE LABS  PRODUCTS
 MULTIPLE LOCAL PRIVILEGE ESCALATION VULNERABILITIES
	
Rubén Santamarta <ruben@...ersemode.com>

04.20.2007
Affected products:
 + ZoneAlarm (Srescan.sys  v 5.0.155 and earlier )

Srescan.sys is exposed through the following Dos Device:“\\.\SreScan”.
Restricted accounts ,including guest users,  can access privileged
IOCTLs implemented within the driver affected.
In addition to this potential risk factor, the driver does not validate
user-mode buffers in Type3 , thus leading to local privilege escalation
due to arbitrary Kernel memory overwrite.

DosDevice: \\.\Srescan
Driver:  srescan.sys  	Version: 5.0.83.0

------------------------- IOCTL 0x2220CF
.text:00013127                 mov     ecx, [ebp+arg_10]
.text:0001312A                 cmp     dword ptr [ecx], 4  ;
.text:0001312D                 jnz     short loc_1313F
.text:0001312F                 mov     edx, [ebp+FileInformation]
.text:00013132                 mov     dword ptr [edx], 30000h ;  edx
controlled
.text:00013138                 xor     esi, esi
.text:0001313A                 mov     [ebp+var_1C], esi
.text:0001313D                 jmp     short loc_1315F

------------------------- IOCTL 0x22208F
text:00014091                 mov     ebp, ds:ExAllocatePoolWithTag
.text:00014097                 mov     esi, 20000h
.text:0001409C                 push    31565244h       ; Tag
.text:000140A1                 push    esi             ; NumberOfBytes
.text:000140A2                 push    0               ; PoolType
.text:000140A4                 call    ebp ; ExAllocatePoolWithTag
.text:000140A6                 mov     ebx, eax
.text:000140A8                 test    ebx, ebx
.text:000140AA                 jz      short loc_140F3
.text:000140AC                 mov     edi, ds:ZwQuerySystemInformation
.text:000140B2
.text:000140B2 loc_140B2:                              ; CODE XREF:
sub_14070+81#j
.text:000140B2                 lea     ecx, [esp+1Ch+ReturnLength]
.text:000140B6                 push    ecx             ; ReturnLength
.text:000140B7                 push    esi             ;
SystemInformationLength
.text:000140B8                 push    ebx             ; SystemInformation
.text:000140B9                 push    5               ;
SystemInformationClass
.text:000140BB                 call    edi ; ZwQuerySystemInformation
.text:000140BD                 cmp     eax, 0C0000023h
.text:000140C2                 mov     [esp+1Ch+var_4], eax
.text:000140C6                 jz      short loc_140D6
.text:000140C8                 cmp     eax, 80000005h
.text:000140CD                 jz      short loc_140D6
.text:000140CF                 cmp     eax, 0C0000004h
.text:000140D4                 jnz     short loc_14102
.text:0001411D loc_1411D:                              ; CODE XREF:
sub_14070+112#j
.text:0001411D                 mov     eax, [edx+44h]
.text:00014120                 test    eax, eax
.text:00014122                 jz      short loc_1417A
[...]
.text:00014154                 mov     dword ptr [eax+4], 0
.text:0001415B                 mov     esi, [edx+3Ch]
.text:0001415E                 lea     edi, [eax+0Ch]    ; edi =
OutputBuffer. Controlled
.text:00014161                 mov     eax, ecx	
.text:00014163                 shr     ecx, 2
.text:00014166                 rep movsd
.text:00014168                 mov     ecx, eax
.text:0001416A                 mov     eax, [esp+1Ch+var_8]
.text:0001416E                 and     ecx, 3
.text:00014171                 inc     eax
.text:00014172                 rep movsb
.text:00014174                 mov     [esp+1Ch+var_8], eax
.text:00014178                 mov     edi, eax


Exploits
No exploits are released. Ethical security companies can contact for
requesting samples :
contact (at) reversemode (dot) com [email concealed]

References:
www.zonelabs.com
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=517
http://www.reversemode.com/index.php?option=com_remository&Itemid=2&func=fileinfo&id=48
(PDF)

-----------

Reversemode
Advanced Reverse Engineering Services
www.reversemode.com

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ