Vulnerability in "Fujitsu Desktop Update" (for Windows) May 08 2013 08:57PM
Stefan Kanthak (stefan kanthak nexgo de)
Hi @ll,

Fujitsu's update utility "Fujitsu Desktop Update" (see
<http://support.ts.fujitsu.com/DeskUpdate/Index.asp>), which is
factory-preinstalled on every Fujitsu (Siemens) PC with Windows,
has a vulnerability which allows the execution of a rogue program
in the security context of the current user.

The application is registered as control panel item via

@="Fujitsu DeskUpdate"

The "shell object" with GUID {070B64FF-795D-4DAA-88AD-6D3277C7E445} is
registered with

@="Fujitsu DeskUpdate"
"InfoTip"=expand:"@C:\\Program Files (x86)\\Fujitsu\\DeskUpdate\\DeskUpdate.exe,-132"
"System.Software.TasksFileUrl"="C:\\Program Files (x86)\\Fujitsu\DeskUpdate\\duconfig.xml"

@=expand:"C:\\Program Files (x86)\\Fujitsu\\DeskUpdate\\DeskUpdate.exe,-0"

@="C:\\Program Files (x86)\\Fujitsu\\DeskUpdate\\DeskUpdate.exe"

The last entry is a pathname with unquoted spaces and allows the
execution of the rogue programs "C:\Program.exe" and/or
"C:\Program Files.exe", as documented in

Stefan Kanthak

PS: long pathnames containing spaces exist for about 20 years
now in Windows, EVERY developer should know how to use them
properly, and EVERY QA should check their proper use!

[ reply ]


Privacy Statement
Copyright 2010, SecurityFocus