[<prev] [next>] [day] [month] [year] [list]
Message-ID: <67fd2f89-a908-6efd-9baa-35d4a1247ed1@securify.nl>
Date: Tue, 17 Mar 2020 14:34:35 +0100
From: "Securify B.V. via Fulldisclosure" <fulldisclosure@...lists.org>
To: fulldisclosure@...lists.org
Subject: [FD] ZoneAlarm TrueVector Internet Monitor service insecure NTFS
permissions vulnerability
------------------------------------------------------------------------
ZoneAlarm TrueVector Internet Monitor service insecure NTFS permissions
vulnerability
------------------------------------------------------------------------
Yorick Koster, December 2019
------------------------------------------------------------------------
Abstract
------------------------------------------------------------------------
A vulnerability was found in the TrueVector Internet Monitor service,
which is installed as part of the Check Point ZoneAlarm firewall. This
vulnerability allows a local attacker to cause the affected service to
change the file permissions of arbitrary local files. After the file
permissions have been changed, the attacker can then overwrite its
content, and ultimately gain elevated privileges on the vulnerable
machine.
------------------------------------------------------------------------
Tested version
------------------------------------------------------------------------
This vulnerability was successfully verified on ZoneAlarm Free Firewall
v15.8.023.18219/TrueVector Internet Monitor v15.8.7.18219.
------------------------------------------------------------------------
Fix
------------------------------------------------------------------------
Check Point released new versions of ZoneAlarm Firewall that fix this
vulnerability. The latest version of ZoneAlarm Free Firewall
(v15.8.043.18324) can be obtained from
https://www.zonealarm.com/software/free-firewall/download.
The 2020-03 Cumulative Update [2] for Windows 10 adds hardlink
mitigations. After installing this update, Windows will require write
access on the target file otherwise the hardlink won't be created.
Requiring write access on the target file also mitigates this issue.
------------------------------------------------------------------------
Introduction
------------------------------------------------------------------------
A vulnerability was found in the TrueVector Internet Monitor service,
which is installed as part of the Check Point ZoneAlarm firewall. This
vulnerability allows a local attacker to cause the affected service to
change the file permissions of arbitrary local files. After the file
permissions have been changed, the attacker can then overwrite its
content, and ultimately gain elevated privileges on the vulnerable
machine.
------------------------------------------------------------------------
Vulnerability details
------------------------------------------------------------------------
The TrueVector Internet Monitor service is running as LocalSystem, it
periodically creates a number of backup files within the
%ProgramData%\CheckPoint\ZoneAlarm\Data\ folder. When these files are
created, their file permissions are explicitly set to Full Control for
Authenticated Users. A local attacker can create a hardlink with the
same name as the backup files, causing the permissions of another file
to be changed.
After the file permissions have been changed, the attacker can then
overwrite its content, and ultimately gain elevated privileges on the
vulnerable machine. Hardlinks can be created using James Forshaw's [3]
CreateHardlink [4] tool.
CreateHardlink.exe
"%ProgramData%\CheckPoint\ZoneAlarm\Data\bu_tosave.ndb"
"%SystemRoot%\win.ini"
CreateHardlink.exe
"%ProgramData%\CheckPoint\ZoneAlarm\Data\bu_todelete.ndb"
"%SystemRoot%\win.ini"
------------------------------------------------------------------------
References
------------------------------------------------------------------------
[1] https://www.securify.nl/advisory/SFY20200317/zonealarm-truevector-internet-monitor-service-insecure-ntfs-permissions-vulnerability.html
[2] https://www.catalog.update.microsoft.com/Search.aspx?q=KB4540673
[3] https://twitter.com/tiraniddo
[4] https://github.com/googleprojectzero/symboliclink-testing-tools/tree/master/CreateHardlink
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists