Multiple MicroWorld eScan Products Local Privilege Escalation Vulnerability
BID:25493
Info
Multiple MicroWorld eScan Products Local Privilege Escalation Vulnerability
| Bugtraq ID: | 25493 |
| Class: | Design Error |
| CVE: |
CVE-2007-4649 |
| Remote: | No |
| Local: | Yes |
| Published: | Aug 30 2007 12:00AM |
| Updated: | Sep 04 2008 11:31PM |
| Credit: | Edi Strosar of Team Intell is credited with the discovery of this issue. |
| Vulnerable: |
MicroWorld Technologies X-Spam for SMTP Servers 5.6a MicroWorld Technologies MailScan for SMTP Servers 5.6 MicroWorld Technologies MailScan for Mail Servers 5.6a MicroWorld Technologies MailScan 5.6.a espatch1 MicroWorld Technologies eScan Workstation Server Suite 9.0.824 .205 MicroWorld Technologies eScan Web and Mail Filter 9.0.824 .205 MicroWorld Technologies eScan Virus Control 9.0.722 .1 MicroWorld Technologies eScan Professional 9.0.824 .205 MicroWorld Technologies eScan Internet Security 9.0.722 .1 MicroWorld Technologies eScan Corporate Edition 9.0.824 205 MicroWorld Technologies eScan AntiVirus 9.0.722 .1 MicroWorld Technologies eScan 9.0.742 .98 |
| Not Vulnerable: | |
Discussion
Multiple MicroWorld eScan Products Local Privilege Escalation Vulnerability
Multiple MicroWorld eScan products are vulnerable to a local privilege-escalation vulnerability because of insecure default file permissions.
Attackers can exploit this issue to execute arbitrary code with SYSTEM-level privileges. Successful attacks will completely compromise affected computers.
The following are vulnerable:
eScan Internet Security 9.0.722.1
eScan Virus Control 9.0.722.1
eScan AntiVirus 9.0.722.1
UPDATE (September 4, 2008): The following additional products have been reported as vulnerable:
eScan Corporate 9.0.x
eScan Professional 9.0.x
eScan Workstation Server 9.0.x
eScan Web and Mail Filter 9.0.x
MailScan for Mail-Server 5.6a
MailScan for SMTP Server 5.6a
X-Spam for SMTP Servers 5.6a
Other versions and software packages may also be affected.
Multiple MicroWorld eScan products are vulnerable to a local privilege-escalation vulnerability because of insecure default file permissions.
Attackers can exploit this issue to execute arbitrary code with SYSTEM-level privileges. Successful attacks will completely compromise affected computers.
The following are vulnerable:
eScan Internet Security 9.0.722.1
eScan Virus Control 9.0.722.1
eScan AntiVirus 9.0.722.1
UPDATE (September 4, 2008): The following additional products have been reported as vulnerable:
eScan Corporate 9.0.x
eScan Professional 9.0.x
eScan Workstation Server 9.0.x
eScan Web and Mail Filter 9.0.x
MailScan for Mail-Server 5.6a
MailScan for SMTP Server 5.6a
X-Spam for SMTP Servers 5.6a
Other versions and software packages may also be affected.
Exploit / POC
Multiple MicroWorld eScan Products Local Privilege Escalation Vulnerability
The following exploit information is available:
The following exploit information is available:
Solution / Fix
Multiple MicroWorld eScan Products Local Privilege Escalation Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
References
Multiple MicroWorld eScan Products Local Privilege Escalation Vulnerability
References:
References:
- eScan Homepage (MicroWorld Technologies)
- Multiple MicroWorld products insecure directory permissions (Edi Strosar
)