Bugtraq mailing list archives

Servers Alive: Local Privilege Escalation


From: Michael Starks <secure () michaelstarks com>
Date: Wed, 16 Mar 2005 11:54:35 -0500

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

#######################################################################
Advisory information:

Title: Servers Alive - Privilege Escalation
CVE Candidate Number: CAN-2005-0352
Application: Servers Alive
Versions known affected: 4.1, 5.0; other versions not tested.
Classification: Privilege Escalation
Author: Michael Starks
Release date: March 16, 2005

#######################################################################
1. Introduction
2. Synopsis
3. Discussion
4. Impact
5. Resolution and/or workaround
6. Vendor Notification timeline
7. Acknowledgments
#######################################################################

1. Introduction
================
- From www.woodstone.nu:

Servers alive allows you to easily monitor hundreds of servers, or Internet 
services on a server, for uptime and availability. When it detects that a 
monitored service or computer has gone down it can make you aware through a 
variety of means.

2. Synopsis
============
A privilege-escalation vulnerability exists, allowing a local non-privileged 
user to obtain SYSTEM.

3. Discussion
==============
Servers Alive can be run in two modes; as an application or as a 
service.  When run as a service, the application is permitted to interact 
with the desktop and runs under the context of SYSTEM.  When loading the 
'Local manual' under help, the application does not drop privileges.  
Consequently, it is possible to assume SYSTEM privileges by:

Viewing the source of the help file, which opens in Notepad.
In Notepad, selecting File, Open.
Launching a system utility such as cmd.exe.

4. Impact
==========
Full local compromise of the host on which Servers Alive is installed.

5. Resolution and/or workaround
================================
The vendor considers this to be a problem with Visual Basic, the language in 
which the application is written.  The vendor has no immediate plans to fix 
the bug and will update documentation to reflect the risks associated with 
running the application under the local SYSTEM account and allowing desktop 
interaction.

To workaround this bug, the following recommendations may be helpful:
- -Only allow trusted users with Administrator-level privileges to logon 
interactively.
- -Physically secure the server on which the application is installed.
- -Do not run the application as a service.

6. Vendor Notification timeline
================================
01/24/05: Vendor notified.
01/25/05: Vendor responded, discussion ensued
01/29/05: CERT notified
02/18/05: CVE Candidate Number assigned from CERT
03/15/05: Advisory publicly released

7. Acknowledgments
=================
- -Dirk Bulinckx of Woodstone Consulting for his quick response and subsequent 
discussion
- -Ralph Durkee of Durkee Consulting, Inc. for advisory review
- -CERT for coordination of CVE candidate number

#######################################################################
Copyright 2005, Michael Starks.  Some rights reserved.  The information in 
this advisory is believed to be true and accurate, however the author offers 
no guarantees of suitability for any purpose.  The research contained within 
is for education purposes only.  This advisory is licensed under the Creative 
Commons Attribution-NonCommercial-NoDerivs License. To view a copy of this 
license, visit http://creativecommons.org/licenses/by-nc-nd/2.0/ or send a 
letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 
94305, USA.
#######################################################################
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFCOGTdso0LP9XgARoRAoX3AKDyORraLveX1estm0lqsAEBZu6mdgCg6WQR
fr2//16oim4X/CZ19RzOKl4=
=4uWt
-----END PGP SIGNATURE-----


Current thread: