Lucene search

K
certCERTVU:953860
HistoryFeb 08, 2006 - 12:00 a.m.

Microsoft Windows privilege escalation vulnerability

2006-02-0800:00:00
www.kb.cert.org
20

4.3 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:S/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

31.1%

Overview

Microsoft Windows access controls may be improperly configured potentially allowing a local attacker to gain elevated privileges on a vulnerable system.

Description

Microsoft Windows provides numerous, fine grained permissions and privileges to control access to Windows components, such as services, files, and registry entries.

Recent research has uncovered insecure configurations within user accounts and groups on Microsoft Windows systems. These configurations may allow local attackers to gain access to, and manipulate system resources. The researchers have developed a model that analyzes permissions to expose privilege escalation vulnerabilities. The research focused on three particular components of the Windows architecture:

Services

Windows services may be installed and configured with unnecessary privileges. This may allow a lesser privileged user to access and change the settings for a service that runs with greater privileges. Of particular concern are the following privileges:

The SERVICE_CHANGE_CONFIG access right allows a user to change the a service’s configuration. This includes the executable that services launches and the user account with which a service runs as. According to Microsoft, “Because this grants the caller the right to change the executable file that the system runs, it should be granted only to administrators.”

The SERVICE_ALL_ACCESS access right allows a user full control over a service.

Files and Directories

Any privileges that allow the contents of a file or a directory to be modified should be granted to only trusted users. The following access rights a of particular concern:

The FILE_ALL_ACCESS access right allows a user to completely control a file, including read, write and execute privileges.

The FILE_APPEND_DATA access right allows a user to add data to a file.

The FILE_WRITE_DATA access right allows a user to write and rewrite data to a file.

Registry Keys

Users with KEY_SET_VALUE permissions can modify registry keys that specify executables, DLLs, and/or Globally Unique Identifiers (GUIDs).
The WRITE_DAC access right provides the ability to modify the access control list for a resource. Users granted this right have the ability to change the way they, or other users, access a resource. This may allow attackers to grant themselves, or others arbitrary permissions over a resource.

Note that these issues can affect all software that is developed for the Microsoft Windows platform. Known Windows services that have weak permissions include, but may not belimited to

* Microsoft SSDP Discovery service (`SSDPSRV`)
* NetBios over TCP/IP service (`NetBT`) 
* Smart Card service (`SCardSvr`)
* Universal Plug and Play Device Host service (`upnphost`)
* DNS Client service (`Dnscache`)
* DHCP Client service (`Dhcp`)   

Impact

A local user with valid login credentials may be able gain elevated privileges on a vulnerable Windows system.

We are aware of publicly available exploit code that claims to be a tool to identify vulnerable services. Installing and running this code may allow a remote attacker to gain access to a system.


Solution

These issues are corrected in Service Pack 2 for Microsoft Windows XP and Service Pack 1 for Microsoft Windows Server 2003. In addition, Microsoft Security Advisory 914457 and Microsoft Security Bulletin MS06-011 contain numerous workarounds to mitigate these vulnerabilities.


Vendor Information

953860

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Adobe __ Affected

Notified: November 28, 2005 Updated: February 08, 2006

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please see <http://www.adobe.com/support/techdocs/332644.html&gt;.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23953860 Feedback>).

Macromedia, Inc. __ Affected

Notified: November 29, 2005 Updated: February 08, 2006

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please see <http://www.macromedia.com/devnet/security/security_zone/mpsb05-04.html&gt;

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23953860 Feedback>).

Microsoft Corporation __ Affected

Notified: November 28, 2005 Updated: February 08, 2006

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please see <http://www.microsoft.com/technet/security/advisory/914457.mspx&gt;.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23953860 Feedback>).

Appgate Network Security __ Not Affected

Notified: December 14, 2005 Updated: February 09, 2006

Status

Not Affected

Vendor Statement

None of our products are vulnerable to this issue

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Fujitsu Not Affected

Notified: December 14, 2005 Updated: April 21, 2006

Status

Not Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Oracle Corporation __ Not Affected

Notified: December 14, 2005 Updated: February 08, 2006

Status

Not Affected

Vendor Statement

We have investigated this issue, and determined that Oracle products are not vulnerable.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

ACROS SI Unknown

Notified: December 14, 2005 Updated: February 08, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Alcatel Unknown

Notified: December 14, 2005 Updated: February 08, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

America Online, Inc. __ Unknown

Notified: November 28, 2005 Updated: February 08, 2006

Status

Unknown

Vendor Statement

AOL is in the process of evaluating the research findings as they relate to installations of AOL software.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Apache HTTP Server Project Unknown

Notified: December 14, 2005 Updated: February 08, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Apple Computer, Inc. Unknown

Notified: December 14, 2005 Updated: February 08, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Bitvise Unknown

Notified: December 14, 2005 Updated: February 08, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Check Point Software Technologies Unknown

Notified: December 14, 2005 Updated: February 08, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Cisco Systems, Inc. Unknown

Notified: December 14, 2005 Updated: February 08, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Ericsson Unknown

Notified: December 14, 2005 Updated: February 08, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Ethereal Unknown

Notified: December 14, 2005 Updated: February 08, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Funk Software Security Group Unknown

Notified: December 14, 2005 Updated: February 08, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Hitachi Unknown

Notified: December 14, 2005 Updated: February 08, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

IAIK Java Group Unknown

Notified: December 14, 2005 Updated: February 08, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

InfoExpress, Inc. Unknown

Notified: December 14, 2005 Updated: February 08, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Inner Media, Inc. Unknown

Notified: December 14, 2005 Updated: February 08, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Isode Unknown

Notified: December 14, 2005 Updated: February 08, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Lightspeed Systems, Inc. Unknown

Notified: December 14, 2005 Updated: February 08, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Lotus Software Unknown

Notified: December 14, 2005 Updated: February 08, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Lucent Technologies Unknown

Notified: December 14, 2005 Updated: February 08, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

MIT Kerberos Development Team Unknown

Notified: December 14, 2005 Updated: February 08, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Mozilla, Inc. Unknown

Notified: December 14, 2005 Updated: February 08, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Orbiteam Unknown

Notified: December 14, 2005 Updated: February 08, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Pragma Systems Unknown

Notified: December 14, 2005 Updated: February 08, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

PuTTY Unknown

Notified: December 14, 2005 Updated: February 08, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

RSA Security, Inc. Unknown

Notified: December 14, 2005 Updated: February 08, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

SafeNet Unknown

Notified: December 14, 2005 Updated: February 08, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

ScriptLogic Unknown

Notified: December 14, 2005 Updated: February 08, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Skype Technologies Unknown

Notified: December 14, 2005 Updated: February 08, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Sun Microsystems, Inc. Unknown

Notified: December 14, 2005 Updated: February 08, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Symantec, Inc. Unknown

Notified: December 14, 2005 Updated: February 08, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

VanDyke Software __ Unknown

Notified: December 14, 2005 Updated: February 08, 2006

Status

Unknown

Vendor Statement

As of yet, we have been unable to find any indication that our VShell product is affected by the privilege escalation issues described. We will continue to investigate the issue and provide any updates to the applicability of this vulnerability to our VShell product as they become available.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

WRQ, Inc. Unknown

Notified: December 14, 2005 Updated: February 08, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Watchguard Technologies, Inc. Unknown

Notified: December 14, 2005 Updated: February 08, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Wind River Systems, Inc. Unknown

Notified: December 14, 2005 Updated: February 08, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Xerox Unknown

Notified: December 14, 2005 Updated: February 08, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Yahoo, Inc. Unknown

Notified: December 14, 2005 Updated: February 08, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

eBay Unknown

Notified: December 14, 2005 Updated: February 08, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

View all 43 vendors __View less vendors __

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

These vulnerabilities were reported by Sudhakar Govindavajhala and Andrew W. Appel.

This document was written by Jeff Gennari.

Other Information

CVE IDs: CVE-2006-0023
Severity Metric: 4.22 Date Public:

4.3 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:S/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

31.1%

Related for VU:953860