ESTsoft ALUpdate Privilege Escalation

Risk: Medium
Local: Yes
Remote: No
CWE: CWE-264

CVSS Base Score: 4.6/10
Impact Subscore: 6.4/10
Exploitability Subscore: 3.9/10
Exploit range: Local
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

# Title: ESTsoft ALUpdate Privilege Escalation Vulnerablity # Version: # Tested on: Windows XP SP2 en # Vendor: # E-Mail: osanda[at] # Author: Osanda Malith Jayathissa # /!\ Author is not responsible for any damage you cause # Use this material for educational purposes only # CVE: CVE-2014-8494 - Description ============== The "ALUpdate" folder and the "ALUpdate.exe" has been granted with full permissions to the "Users" group. Any user other than the administrator could plant malware or bind malware to the original EXE file. This is valid to any software you download from the vendor. - Proof of Concept =================== C:\Program Files\ESTsoft>cacls ALUpdate C:\Program Files\ESTsoft\ALUpdate BUILTIN\Users:(OI)(CI)F NT SERVICE\TrustedInstaller:(ID)F NT SERVICE\TrustedInstaller:(CI)(IO)(ID)F NT AUTHORITY\SYSTEM:(ID)F NT AUTHORITY\SYSTEM:(OI)(CI)(IO)(ID)F BUILTIN\Administrators:(ID)F BUILTIN\Administrators:(OI)(CI)(IO)(ID)F BUILTIN\Users:(ID)R BUILTIN\Users:(OI)(CI)(IO)(ID)(special access:) GENERIC_READ GENERIC_EXECUTE CREATOR OWNER:(OI)(CI)(IO)(ID)F C:\Program Files\ESTsoft>cd ALUpdate C:\Program Files\ESTsoft\ALUpdate>cacls ALUpdate.exe C:\Program Files\ESTsoft\ALUpdate\ALUpdate.exe BUILTIN\Users:(ID)F NT AUTHORITY\SYSTEM:(ID)F BUILTIN\Administrators:(ID)F

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2021,


Back to Top