Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:14175
HistorySep 07, 2006 - 12:00 a.m.

SECURITY.NNOV: Panda Platinum Internet Security privilege escalation / bayesian filter control security vulnerabilities

2006-09-0700:00:00
vulners.com
39

Noise:

We have more and more application to secure our networks. Does it means
network becomes more and more secure? No, there is a limit. Because
any application has vulnerabilities. For in much security is much
grief: and he that increaseth code increaseth bugs [1].

Title: Panda Platinum Internet Security 2006/2007 privilege escalation
and bayesian filter control security vulnerabilities
Author: 3APA3A <[email protected]>
http://www.security.nnov.ru/
Vendor: Panda Software
Product: Panda Platinum Internet Security 2006 10.02.01
Panda Platinum Internet Security 2007 11.00.00
Panda Antivirus was not tested
Category:
1. Local, privilege escalation (insecure file
permissions)
2. Remote, against client (bayesian filter control)
Rating: High (privilege escalation)
Low (bayesian filter control)
Advisory: http://www.security.nnov.ru/advisories/pandais.asp

Intro:

Panda Platinum Internet Security 2006/2007 is Internet security suite
(Antivirus, Personal Firewall, Antispam) from Panda Software.

Vulnerability:

  1. Insecure file permissions allow unprivileged local user to obtain
    system-level access or access to account of another logged on user.
  2. Insecure design of SPAM filtering control engine allows remote
    attacker to control bayesian self leaning SPAM filtering process from
    malicious Web page.

Details:

  1. During installation of Panda Platinum Internet Security 2006/2007
    permissions for installation folder
    %ProgramFiles%\Panda Software\Panda Platinum 2006 Internet Security\
    or
    %ProgramFiles%\Panda Software\Panda Platinum 2007 Internet Security\
    by default are set to Everyone:Full Control without any warning. Few
    services (e.g. WebProxy.exe for Platinum 2006 or PAVSRV51.EXE for
    Platinum 2007) are started from this folder. Services are started under
    LocalSystem account. There is no protection of service files. It's
    possible for unprivileged user to replace service executable with the
    file of his choice to get full access with LocalSystem privileges. Or to
    get privileges or any user (including system administrator) who logons
    to vulnerable host. This can be exploited as easy as:

    a. Rename WebProxy.exe (for Platinum 2006 or another service for
    Platinum 2007, because under 2007 WebProxy.exe is not executed
    as a service) to WebProxy.old in Panda folder
    b. Copy any application to WebProxy.exe
    c. Reboot

Upon reboot trojaned application will be executed with LocalSystem
account.

  1. To manage SPAM filtering for messages received with POP3, Panda
    starts Web server on the interface 127.0.0.1 with port 6083 and adds
    text like

Text inserted by Platinum 2007:

This message has NOT been classified as spam. If it is unsolicited mail (spam), click on the following link to reclassify it: http://127.0.0.1:6083/Panda?ID=pav_8&amp;SPAM=true

By clicking the link user can classify message as a spam or not.
ID=pav_XXX parameters contains ID of the message, where XXX is
sequential message number. On reply, this message is not filtered or
erased.
First, it leaks information about correspondence flow user has.
Second, it's possible for malicious Web page to use something like
[IMG SRC="http://127.0.0.1:6083/Panda?ID=pav_8&amp;SPAM=true&quot;]
[IMG SRC="http://127.0.0.1:6083/Panda?ID=pav_9&amp;SPAM=true&quot;]
[IMG SRC="http://127.0.0.1:6083/Panda?ID=pav_10&amp;SPAM=true&quot;]
It will cause incorrect message classification as a SPAM and will lead
to unpredictable filter behavior.

Vendor:

11.08.2006 Panda Software was contacted via [email protected],
[email protected], [email protected], [email protected]
15.08.2006 [email protected] (Panda Software Russia) was contacted in Russian
16.08.2006 Response from Panda Software Russia
16.08.2006 Additional details sent to Panda Software Russia
17.08.2006 Panda Software launches Panda Internet Security 2007 which
suffers from the same vulnerabilities

References:

  1. Ecc 1:18


http://www.security.nnov.ru
/\_/\
{ , . } |\
±-oQQo->{ ^ }<-----+ \
| ZARAZA U 3APA3A } You know my name - look up my number (The Beatles)
±------------o66o–+ /
|/