ShineShadow Security Report 15092009-09
TITLE
Local privilege escalation vulnerability in Protector Plus antivirus software
BACKGROUND
Protector Plus range of antivirus products are known the world over for their efficiency and reliability. Protector Plus
Antivirus Software is available for Windows Vista, Windows XP, Windows Me, Windows 2000, Windows 98, Windows 2000/2003/NT
server and NetWare platforms. Protector Plus Antivirus Software is the ideal antivirus protection for your computer against
all types of malware like viruses, trojans, worms and spyware.
VULNERABLE PRODUCTS
Protector Plus 2009 for Windows Desktops (8.0.E03)
Protector Plus 2009 for Windows Server (8.0.E03)
Protector Plus Professional (9.1.001)
Previous versions may also be affected
DETAILS
Protector Plus installs the own program files with insecure permissions (Everyone - Full Control). Local attacker
(unprivileged user) can replace some files (for example, executable files of Protector services) by malicious file and
execute arbitary code with SYSTEM privileges. This is local privilege escalation vulnerability.
For example, the following attack scenario could be used:
EXPLOITATION
This is local privilege escalation vulnerability. An attacker must have valid logon credentials to a system where
vulnerable software is installed.
WORKAROUND
No workarounds
DISCLOSURE TIMELINE
31/08/2009 Initial vendor notification. Secure contacts requested.
01/09/2009 Vendor response
03/09/2009 Vulnerability details sent. Confirmation requested. – no reply
09/09/2009 Vulnerability details sent. Confirmation requested. – no reply
11/09/2009 Last attempt to get reply from vendor. Vulnerability details sent. Confirmation requested. – no reply
15/09/2009 Advisory released
CREDITS
Maxim A. Kulakov (aka ShineShadow)
ss_contacts[at]hotmail.com