Jump to content
Aerosol

Avira 14.0.7.342 - (avguard.exe) Service Trusted Path Privilege Escalation

Recommended Posts

Posted

# Exploit Title: Avira 14.0.7.342 (avguard.exe)  Service Trusted Path Privilege Escalation
# Date: 11/12/2014
#Author: Hadji Samir s-dz@hotmail.fr
#Product web page: http://www.avira.com/
#Affected version: 14.0.7.342
#Tested on: Windows 7 (FR)




Avira free antivirus 14.0.7.342
(avguard.exe)
Avira free antivirus 14.0.7.342 contains a flaw in the 'avguard.exe' file that may reportedly allow gaining access to unauthorized privileges.
The issue is due to an unquoted search path, which may allow a local attacker
to inject arbitrary code in the root path.


C:\Users\samir>sc qc AntiVirService
[SC] QueryServiceConfig réussite(s)

SERVICE_NAME: AntiVirService
TYPE : 10 WIN32_OWN_PROCESS
START_TYPE : 2 AUTO_START
ERROR_CONTROL : 1 NORMAL
BINARY_PATH_NAME : "C:\Program Files\Avira\AntiVir Desktop\avguard.exe"
LOAD_ORDER_GROUP :
TAG : 0
DISPLAY_NAME : Avira Real-Time Protection
DEPENDENCIES :
SERVICE_START_NAME : LocalSystem

C:\Users\samir>icacls "C:\Program Files\Avira\AntiVir Desktop\avguard.exe"
C:\Program Files\Avira\AntiVir Desktop\avguard.exe AUTORITE NT\Système:(I)(F)
BUILTIN\Administrateurs:(I)(F)
BUILTIN\Utilisateurs:(I)(RX)

1 fichiers correctement traités ; échec du traitement de 0 fichiers

Source

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...