Lucene search

K

carboncopy.txt

🗓️ 27 Oct 2004 00:00:00Reported by Kevin FinisterreType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 17 Views

Exploit found in Carbon Copy allows privilege escalation to SYSTEM rights via help menu access.

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`The only reason this was never disclosed was originally in hopes of   
proper vendor response... I spoke to their tech support about 5 times   
but they were just total morons. I eventually gave up.  
  
I was going to write a shatter like attack so this could be exploited   
ala .exe file but I never had time.  
  
Tested on Carbon Copy Version 6.0.5257  
  
Start the Carbon Copy Service...  
CCSRVC.exe is running as SYSTEM.  
  
In the task bar you should see a little blue and white CC icon. Right   
click on it and choose show user interface. CCW32.exe will then be   
started with SYSTEM rights.  
  
Choose help then "carbon copy help topics"... right click on the right   
hand side of the help pane and choose "view source". You should get   
notepad.exe running as SYSTEM. Click File then open... browse to cmd.exe   
right click and open it.  
  
Now you have local SYSTEM  
  
  
Carbon Copy Scheduler at one point in time had its own service as well   
so it could also be used to take SYSTEM... CCSched.exe runs as SYSTEM.  
The schedulers help button can be used to take SYSTEM. The Add button   
will take you to an other screen with a browse button that can be used...  
  
Several variations of this span the products various versions. The   
latest version I used did not contain the Scheduler Service...  
  
I will eventually write up a proper advisory for this and an exploit   
but... like I stated above... just been too busy to write the exploit.  
  
Enjoy.  
  
-KF  
  
  
Brooks, Shane wrote:  
> Can you elaborate a bit on the privilege escalation that you mentioned? If the hole has indeed been there over a year, why not disclose it publicy? Does anyone else have any info on Altiris vulnerabilities?   
>   
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
27 Oct 2004 00:00Current
7.4High risk
Vulners AI Score7.4
17
.json
Report