lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <151212550.20090115184300@Zoller.lu>
Date: Thu, 15 Jan 2009 18:43:00 +0100
From: Thierry Zoller <Thierry@...ler.lu>
To: NTBUGTRAQ <NTBUGTRAQ@...TSERV.NTBUGTRAQ.COM>,
	bugtraq <bugtraq@...urityfocus.com>,
	full-disclosure <full-disclosure@...ts.grok.org.uk>,
	<info@...cl.etat.lu>, <vuln@...unia.com>, <cert@...t.org>,
	<nvd@...t.gov>, <cve@...re.org>
Subject: [TZO-2009-2] Avira Antivir - Priviledge escalation

___________________________________________________________________

From  the 'cover-your-basics' and from the 'they-still-exist-department'
   Antivir insecure CreateProcess() usage - Privilege Esclation
                 and autostart as free bonus
___________________________________________________________________

Reference     : [TZO-2009-2]-Avira Antivir Priviledge escalation
WWW           : http://blog.zoller.lu/2009/01/tzo-2009-2-avira-antivir-priviledge.html
Product       : AV7/AV8 desktop products :
                - Avira AntiVir Premium
                - Avira Premium Security Suite
                - Avira AntiVir Professional
Vendor        : http://www.avira.de


I. Background
~~~~~~~~~~~~~
Avira AntiVir is a reliable  free  antivirus  solution,   that
constantly and  rapidly  scans  your  computer  for  malicious
programs such as viruses, Trojans, backdoor programs,  hoaxes,
worms, dialers etc. Monitors  every  action  executed  by  the
user or the  operating  system  and  reacts  promptly  when  a
malicious program is detected.

The  protection  experts  have  numerous  company    locations
throughout  Germany  and  cultivate  partnerships  in  Europe,
Asia and America. Avira has more than 180 employees  at  their
main office in Tettnang near Lake  Constance  and  is  one  of
the largest employers in the region.   There  are  around  250
people employed  worldwide  whose  commitment  is  continually
being confirmed by  awards.   A  significant  contribution  to
protection is the Avira AntiVir Personal which is  being  used
by private users a million times over.

AV-Comparatives e.V. have  chosen  Avira  AntiVir  Premium  as
the best anti-virus solution of 2008 


II. Description
~~~~~~~~~~~~~~~
No funky IOCTL just a plain unsafe  call  to  CreateProcess().
In detail, the  scheduler  (sched. exe)  running  with  SYSTEM
privileges calls the  CreateProcess()  API  without  enclosing
lpCommandLine  in  quotes  to  _regularly_  shell   avwsc.exe

Calling an executable with a path has spaces  in  it  and  not
using  quotes  will  trigger  windows  to  search   for    the
executable in various areas.

Calling for instance -  

 CreateProcess(
  NULL,
  c:\program files\avira\antivir PersonalEdition Classic\avwsc.exe,
  ...
  );
   
will first look for
c:\program.exe
and then
c:\program files\avira\antivir.exe

This is documented and intended behaviour as can be seen at : 
http://msdn.microsoft.com/en-us/library/ms682425.aspx

Quoting ms682425.aspx : 
The lpApplicationName parameter can be NULL. In that case,  
the module  name  must  be  the  first  white  space–delimited
token in the lpCommandLine string. If you  are  using  a  long
file name that  contains  a  space,   use  quoted  strings  to
indicate where the file name ends  and  the  arguments  begin;
otherwise, the file name is ambiguous. For example,   consider
the string  "c:\program  files\sub  dir\program  name".   This
string can be interpreted in a number  of  ways.   The  system
tries to interpret the possibilities in the  following  order:


c:\program.exe files\sub dir\program name, c:\program files\sub.exe dir\program name
c:\program files\sub dir\program.exe name, c:\program files\sub dir\program name.exe 

Pre-conditions for a CreateProcess() call to be insecure :
- lpApplicationName contains a NULL 
- the path in lpCommandLine cotains white space 
- the path in lpCommandLine is not enclosed in quotation marks

III. Impact
~~~~~~~~~~~
- Elevation of privileges from USER to SYSTEM  is  possible  
by  writing the payload  to c:\program files\avira\antivir.exe    
- Autostart vector - The payload will be executed even  after 
a reboot

IV. Disclosure Timeline
~~~~~~~~~~~~~~~~~~~~~~~~
28/09/2008 : Contacted and send bug report to Avira
28/09/2008 : Avira acknowledges receipt
01/10/2008 : Avira notifies me that the issue will be fixed 
             with there next Emergency Update (EU2)
24/10/2008 : The update is pushed to customers
24/10/2008 : Avira notifies me that credits have been posted 
here: http://www1.avira.com/en/support/faq/details.html?id=419             
15/01/2009 : Release of this advisory


References :
[1] http://lists.grok.org.uk/pipermail/full-disclosure/2005-November/038789.html
[2] CreateProcess() - http://msdn.microsoft.com/en-us/library/ms682425.aspx
[3] Book: Fuzzing - Brute force vulnerability discovery
[4] Loadlibrary() -  http://msdn.microsoft.com/en-us/library/ms684175(VS.85).aspx
If the string does not specify a path, the function uses a standard search strategy to find the file.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ