BugTraq
Microsoft Window Utility Manager Local Elevation of Privileges Jul 13 2004 08:00PM
Vivek Rathod (Application Security, Inc.) (vrathod appsecinc com) (1 replies)
Re: Microsoft Window Utility Manager Local Elevation of Privileges Jul 14 2004 11:58AM
Chris Paget (ivegotta tombom co uk) (2 replies)
On Tue, 13 Jul 2004 16:00:33 -0400, you wrote:

>Microsoft Window Utility Manager Local Elevation of Privileges

<snip>

>To exploit the vulnerability, an attacker would need only to run the
>following code:
>
>After this code has been executed, winhlp32.exe will ask the attacker to
>locate the umandlg.hlp help file. The attacker can then select "Yes" and
>an Open dialog will be shown. The attacker can then search and select
>cmd.exe. The attacker will then have a shell running under Local System
>privileges.

This isn't quite right - on my system at least, browsing for cmd.exe
in this way generates an error:
"The C:\WINNT\system32\cmd.exe file is not a Windows Help file, or the
file is corrupted."

That said, the file dialog can be made to display a ListView control
(display details rather than a list). This ListView control will
accept both WM_SETTEXT (to inject shellcode into the caption of the
window) followed by LVM_SORTITEMS (which specifies the address for a
sort function) to execute said code. It is a valid method for
arbitrary code execution as LocalSystem, but not quite as simply as
Vivek makes out.

Chris

--
Chris Paget
ivegotta (at) tombom.co (dot) uk [email concealed]

[ reply ]
Re: Microsoft Window Utility Manager Local Elevation of Privileges Jul 15 2004 02:32PM
Cesar (cesarc56 yahoo com)
Re: Microsoft Window Utility Manager Local Elevation of Privileges Jul 14 2004 06:24PM
KF (lists) (kf_lists secnetops com)


 

Privacy Statement
Copyright 2010, SecurityFocus