Computer Security
[EN] securityvulns.ru no-pyccku


Microsoft Windows system services privilege escalation
updated since 01.02.2006
Published:11.04.2006
Source:
SecurityVulns ID:5721
Type:local
Threat Level:
8/10
Description:There are several local services SSDP Discovery service, Universal Plug and Play Host service) allow any authenticated user to configure service. It makes it possible to specify executable file and elevate privilege to Local System. Also vulnerable: HP Software: "Pml Driver HPZ12" (HP Printer Laserjet 4200L PCL 6) Audodesk: "Autodesk Licensing Service" Dell Power Managment Software for network cards: "NICCONFIGSVC" Macromedia: "Macromedia Licensing Service" Zonelabs.com TrueVector Device Driver: "vsdatant" C-Dilla Software: "C-DillaCdaC11BA" Macrovision SECURITY Driver (Security Windows NT): "CdaC15BA" Macrovision SECURITY Driver (Security Windows NT): "SecDrv"
Affected:MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
Original documentdocumentMICROSOFT, Microsoft Security Bulletin MS06-011 Permissive Windows Services DACLs Could Allow Elevation of Privilege (914798) (11.04.2006)
 documentyourname_(at)_yourdomain.com, Copy protection scheme SafeDisc allows privilege escalation (12.03.2006)
 documentAndres Tarasco , [Full-disclosure] Privilege Scalation for Windows Networks using weak Service restrictions v2.0 exploit (13.02.2006)
 documentsudhakar+bugtraq_(at)_cs.princeton.edu, Windows Access Control Demystified (01.02.2006)
Files:Windows Access Control Demystified
 Privilege Checker for Windows Services exploits weak service permissions
 Exploits Privilege Escalation for Windows Networks using weak Service restrictions v2.0
 Microsoft Security Bulletin MS06-011 Permissive Windows Services DACLs Could Allow Elevation of Privilege (914798)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod