PowerStrip < = 3.84 (pstrip.sys) Privilege Escalation Exploit

2008.12.30
Credit: NT Internals
Risk: High
Local: Yes
Remote: No
CWE: CWE-264


CVSS Base Score: 7.2/10
Impact Subscore: 10/10
Exploitability Subscore: 3.9/10
Exploit range: Local
Attack complexity: Low
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

//////////////////////////////////////////////////////////////////////////////////// // +----------------------------------------------------------------------------+ // // | | // // | EnTech Taiwan - http://www.entechtaiwan.com/ | // // | | // // | Affected Software: | // // | PowerStrip <= 3.84 | // // | | // // | Affected Driver: | // // | PowerStrip support NT kernel-mode driver - pstrip.sys <= 5.0.1.1 | // // | | // // | Local Privilege Escalation Exploit | // // | For Educational Purposes Only ! | // // | | // // +----------------------------------------------------------------------------+ // // | | // // | NT Internals - http://www.ntinternals.org/ | // // | alex ntinternals org | // // | 20 December 2008 | // // | | // // | References: | // // | Exploiting Common Flaws in Drivers | // // | Ruben Santamarta - http://reversemode.com/ | // // | | // // +----------------------------------------------------------------------------+ // //////////////////////////////////////////////////////////////////////////////////// Exploit: http://www.ntinternals.org/ntiadv0810/PowerStrip_Exp.zip Advisory: http://www.ntinternals.org/ntiadv0810/ntiadv0810.html

References:

http://xforce.iss.net/xforce/xfdb/47532
http://www.ntinternals.org/ntiadv0810/ntiadv0810.html
http://www.milw0rm.com/exploits/7533
http://secunia.com/advisories/33249


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top