AvastSvc - Local Privilege Escalation (LPE)
Автор: Fools of security
Загружено: 2020-04-01
Просмотров: 390
Описание:
Found multiple vulnerability on RPC Endpoint on "aswTask
1. Weak Security Implementation - Allow user to trigger shutdown via RPC from Low Integrity Process using TempShutDownMachine (High)
2. Arbitrary Write/Change data to [Components] section in Stats.ini file via RPC from Low Integrity Process (High)
3. Weak Security Implementation - Allow user to trigger reboot via RPC from Low Integrity Process (High)
4. Weak Security Implementation - Able to Launch Avast Repair App RPC call from Low Integrity Process (Medium)
5. Enumerate the network interface and access point from low integrity process via RPC (High)
6. Arbitrary File Deletion via RPC, when Self Defense is Enabled (Critical)
7. Weak Security Implementation - Able to perform all the below task from untrusted process, when Self Defense is Enabled (High)
tskexFileMoveToChestImpl
tskexFileRepairImpl
tskexFileAutoFixImpl
tskexFileCleaningOfferImpl
tskexUpdateSetupSessionImpl
8. Local Privilege Escalation (LPE) on AvastSVC.exe via RPC - Got System Shell (Critical)
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: