lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <d752cd8f-54a3-4c15-c248-09cd91021288@bluefrostsecurity.de>
Date: Mon, 13 Jun 2016 15:22:22 +0200
From: Benjamin Gnahm <benjamin@...efrostsecurity.de>
To: fulldisclosure@...lists.org
Subject: [FD] Samsung SW Update - Insecure ACLs on SW Update Service
 Directory - EoP Vulnerability

Blue Frost Security GmbH
https://www.bluefrostsecurity.de/              
research(at)bluefrostsecurity.de
BFS-SA-2016-003                                                   
25-April-2016
________________________________________________________________________________

Vendor:                 Samsung, www.samsung.com
Affected Products:      SW Update
Affected Version:       <= 2.2.7.22
Vulnerability:          Insecure ACLs on SW Update Service Directory
CVE ID:                 n/a
OVE ID:                 OVE-20160530-0004
Vendor ID:              SI-6041
________________________________________________________________________________

I.   Impact

If the SW Update software is installed on a Windows system, any
authenticated
user can escalate privileges to become the SYSTEM user by placing a crafted
DLL file in the SW Update Service directory and triggering or waiting
for the
next system reboot.
________________________________________________________________________________

II.  Vulnerability Details

Samsung consumer computers come with a preinstalled software called SW
Update.
This software is used to install and update all the necessary drivers and
software.

The SW Update software installs a Windows service called SWUpdateService
which
is running as SYSTEM. The service binary SWMAgent.exe is located in the
directory "C:\ProgramData\Samsung\SW Update Service\".

The ACLs set on this directory allow any authenticated user to create
new files
as can be seen by the FILE_WRITE_DATA access right below:

C:\>cacls "c:\Programdata\Samsung\SW Update Service"
c:\Programdata\Samsung\SW Update Service NT AUTHORITY\SYSTEM:(OI)(CI)(ID)F
                                        
BUILTIN\Administrators:(OI)(CI)(ID)F
                                         CREATOR OWNER:(OI)(CI)(IO)(ID)F
                                         BUILTIN\Users:(OI)(CI)(ID)R
                                         BUILTIN\Users:(CI)(ID)(special
access:)
                                                       FILE_WRITE_DATA
                                                       FILE_APPEND_DATA
                                                       FILE_WRITE_EA
                                                       FILE_WRITE_ATTRIBUTES

When the service is started it tries to load several non-existing DLL files
from the service directory such as MSIMG32.dll, UxTheme.dll or USERENV.dll.

A user can place a malicious DLL file with one of the expected names into
that directory and wait until the service is restarted. The service can not
be restarted by normal users but an attacker could just reboot the system or
wait for the next reboot to happen.

Afterwards his malicious DLL file would be loaded by the service which is
running with SYSTEM privileges which would give the attacker full control
over the machine.
________________________________________________________________________________

III. Mitigation

To mitigate the issue the ACL on the service directory should be adjusted to
prevent normal users from writing to this directory or install the official
update to version 2.2.7.24.
________________________________________________________________________________

IV.  Disclosure Timeline

- 2016-04-25 contacted mobile.security@...sung.com and requested a security
             contact for consumer desktop / notebook software
- 2016-04-29 Samsung confirmed that the advisory was received and that
it will
             be analyzed
- 2016-05-27 Requested status update
- 2016-05-30 Samsung confirmed that issue "SI-6041" has been fixed starting
             with version 2.2.7.24
- 2016-05-30 Requested OVE ID: OVE-20160530-0004 was assigned
________________________________________________________________________________

Credit:
Bug found by Benjamin Gnahm (@mitp0sh) of Blue Frost Security GmbH.
________________________________________________________________________________

Unaltered electronic reproduction of this advisory is permitted. For all
other
reproduction or publication, in printing or otherwise, contact
research(at)bluefrostsecurity de for permission. Use of the advisory
constitutes
acceptance for use in an "as is" condition. All warranties are excluded.
In no
event shall Blue Frost Security be liable for any damages whatsoever
including
direct, indirect, incidental, consequential, loss of business profits or
special damages, even if Blue Frost Security has been advised of the
possibility of such damages.

Copyright 2016 Blue Frost Security GmbH. All rights reserved. Terms of
use apply.



_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ