4.6 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
47.0%
SunnComm MediaMax contains a privilege elevation vulnerability, which may allow a user with limited rights to execute code with elevated privileges.
SunnComm MediaMax
SunnComm MediaMax is copy protection software that is automatically installed by some audio CDs. Sony BMG has provided a list of titles that include MediaMax version 5 software. A device driver is Included with the MediaMax software, which prevents the CD from being copied. The user must be a member of the Windows “Administrators
” or “Power Users
” group for the software to install. Note that the driver and part of the software is installed before the End User License Agreement (EULA) is presented to the user.
The problem
The MediaMax software is installed with file permissions that are not restrictive enough. The MediaMax software is located in “\Program Files\Common Files\SunnComm Shared
.” The MediaMax installer grants “Full Control
” file permissions to “Everyone
,” which means that any user of the system may replace the MediaMax software with arbitrary code. The next time a CD that contains MediaMax is launched, this code will run with the privileges of the user that is logged on. If the user who launches the MediaMax CD has administrative privileges, then the attacker-supplied code will also run with administrative privileges.
This vulnerability may give a user with access to the filesystem the ability to execute arbitrary code with elevated privileges.
Apply a patch or update
SunnComm has provided a Frequently Asked Questions document and an update to address this issue.
Disable Autorun
To help protect yourself against software running without your consent, disable Autorun as described in Microsoft Support Document 155217. This will prevent Windows from automatically running software when CD or DVD media is inserted.
Use least privilege
Use “least privilege” approach to user accounts. By reducing the privileges of the user accounts, the impact of this and other vulnerabilties may be reduced. More information about this technique is available in the Microsoft TechNet article Applying the Principle of Least Privilege to User Accounts on Windows XP.
928689
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: April 10, 2006 Updated: April 12, 2006
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Please see the MediaMax Frequently Asked Questions. This document contains information about the vulnerability and also provides an update to the software.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23928689 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
Thanks to EFF for reporting this vulnerability, who in turn credit Jesse Burns and Alex Stamos of iSEC Partners.
This document was written by Will Dormann.
CVE IDs: | CVE-2005-4069 |
---|---|
Severity Metric: | 2.81 Date Public: |