sheed Antivirus 2.3 Privilege Escalation

2016-10-11T00:00:00
ID PACKETSTORM:139089
Type packetstorm
Reporter Amir.ght
Modified 2016-10-11T00:00:00

Description

                                        
                                            `#########################################################################  
# Exploit Title: sheed AntiVirus Unquoted Service Path Privilege Escalation  
# Date: 11/10/2016  
# Author: Amir.ght  
# Vendor Homepage: http://sheedantivirus.ir/  
# Software Link:http://dl.sheedantivirus.ir/setup.exe  
#version : 2.3 (Latest)  
# Tested on: Windows 7  
##########################################################################  
  
sheed AntiVirus installs a service with an unquoted service path  
To properly exploit this vulnerability,  
the local attacker must insert an executable file in the path of the service.  
Upon service restart or system reboot, the malicious code will be run  
with elevated privileges.  
-------------------------------------------  
C:\>sc qc ShavProt  
[SC] QueryServiceConfig SUCCESS  
  
SERVICE_NAME: ShavProt  
TYPE : 110 WIN32_OWN_PROCESS (interactive)  
START_TYPE : 2 AUTO_START  
ERROR_CONTROL : 0 IGNORE  
BINARY_PATH_NAME : C:\Program Files\Sheed AntiVirus\shgrprot.exe  
LOAD_ORDER_GROUP :  
TAG : 0  
DISPLAY_NAME : ShavProt  
DEPENDENCIES :  
SERVICE_START_NAME : LocalSystem  
`