Lucene search

K
zeroscienceGjoko KrsticZSL-2011-5062
HistoryDec 05, 2011 - 12:00 a.m.

SopCast 3.4.7 (Diagnose.exe) Improper Permissions

2011-12-0500:00:00
Gjoko Krstic
zeroscience.mk
78

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

6.7 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

26.0%

Title: SopCast 3.4.7 (Diagnose.exe) Improper Permissions
Advisory ID: ZSL-2011-5062
Type: Local
Impact: Privilege Escalation
Risk: (3/5)
Release Date: 05.12.2011

Summary

SopCast is a simple, free way to broadcast video and audio or watch the video and listen to radio on the Internet. Adopting P2P(Peer-to-Peer) technology, It is very efficient and easy to use. SoP is the abbreviation for Streaming over P2P. Sopcast is a Streaming Direct Broadcasting System based on P2P. The core is the communication protocol produced by Sopcast Team, which is named sop://, or SoP technology.

Description

SopCast is vulnerable to an elevation of privileges vulnerability which can be used by a simple user that can change the executable file with a binary of choice. The vulnerability exist due to the improper permissions, with the ‘F’ flag (full control) for the ‘Everyone’ group, for the ‘Diagnose.exe’ binary file which is bundled with the SopCast installation package.

Vendor

SopCast.com - <http://www.sopcast.com>

Affected Version

3.4.7.45585

Tested On

Microsoft Windows XP Professional SP3 (EN)

Vendor Status

[30.11.2011] Vulnerability discovered.
[01.12.2011] Contact with the vendor with sent detailed info.
[04.12.2011] No response from the vendor.
[05.12.2011] Public security advisory released.

PoC

sopcast_priv.txt

Credits

Vulnerability discovered by Gjoko Krstic - <[email protected]>

References

[1] <http://www.exploit-db.com/exploits/18201/&gt;
[2] <http://secunia.com/advisories/40940/&gt;
[3] <http://xforce.iss.net/xforce/xfdb/71622&gt;
[4] <http://www.securityfocus.com/bid/50908&gt;
[5] <http://packetstormsecurity.org/files/107527/ZSL-2011-5062.txt&gt;
[6] <http://securityreason.com/exploitalert/11022&gt;
[7] <http://osvdb.org/show/osvdb/77724&gt;
[8] <https://vulners.com/cve/CVE-2011-5044&gt;

Changelog

[05.12.2011] - Initial release
[06.12.2011] - Added reference [3], [4] and [5]
[08.12.2011] - Added reference [6]
[15.12.2011] - Added reference [7]
[15.01.2012] - Added reference [8]

Contact

Zero Science Lab

Web: <http://www.zeroscience.mk>
e-mail: [email protected]

<html><body><p>SopCast 3.4.7 (Diagnose.exe) Improper Permissions


Vendor: SopCast.com
Product web page: http://www.sopcast.com
Affected version: 3.4.7.45585

Summary: SopCast is a simple, free way to broadcast video and audio or watch
the video and listen to radio on the Internet. Adopting P2P(Peer-to-Peer)
technology, It is very efficient and easy to use. SoP is the abbreviation for
Streaming over P2P. Sopcast is a Streaming Direct Broadcasting System based
on P2P. The core is the communication protocol produced by Sopcast Team, which
is named sop://, or SoP technology.

Desc: SopCast is vulnerable to an elevation of privileges vulnerability which
can be used by a simple user that can change the executable file with a binary
of choice. The vulnerability exist due to the improper permissions, with the 'F'
flag (full control) for the 'Everyone' group, for the 'Diagnose.exe' binary file
which is bundled with the SopCast installation package.

Tested on: Microsoft Windows XP Professional SP3 (EN)


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
                            @zeroscience


Vendor status:

[30.11.2011] Vulnerability discovered.
[01.12.2011] Contact with the vendor with sent detailed info.
[04.12.2011] No response from the vendor.
[05.12.2011] Public security advisory released.


Advisory ID: ZSL-2011-5062
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5062.php


30.11.2011

--


C:\Program Files\SopCast&gt;cacls Diagnose.exe
C:\Program Files\SopCast\Diagnose.exe Everyone:F &lt;-----
                                      BUILTIN\Users:R
                                      BUILTIN\Power Users:C
                                      BUILTIN\Administrators:F
                                      NT AUTHORITY\SYSTEM:F
                                      LABPC\User101:F

C:\Program Files\SopCast&gt;
</p></body></html>

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

6.7 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

26.0%

Related for ZSL-2011-5062