RealTimes (Realplayer) 18.0.1.6 Privilege Escalation

2015.06.17
Credit: Jay Turla
Risk: Medium
Local: Yes
Remote: No
CVE: N/A
CWE: CWE-264

# RealTimes (Realplayer) Desktop Service Trusted Path Privilege Escalation # Affected Version: 18.0.1.6 or below # Vendor Homepage: http://www.real.com/?ref=cloud # Vulnerability discovered by Jay Turla (@shipcod3) # Tested on Windows 7 Service Pack 1 # Reference: https://isc.sans.edu/diary/Help+eliminate+unquoted+path+vulnerabilities/14464 RealTimes (Realplayer) is vulnerable to Service Trusted Path Privilege Escalation because its path in the binary services are unquoted and contain spaces specifically the "RealTimes Desktop Service" for Windows. C:\Users\jay>sc qc "RealTimes Desktop Service" [SC] QueryServiceConfig SUCCESS SERVICE_NAME: RealTimes Desktop Service TYPE : 10 WIN32_OWN_PROCESS START_TYPE : 2 AUTO_START ERROR_CONTROL : 1 NORMAL BINARY_PATH_NAME : c:\program files (x86)\real\realplayer\RPDS\Bin\rpdsvc.exe LOAD_ORDER_GROUP : TAG : 0 DISPLAY_NAME : RealTimes Desktop Service DEPENDENCIES : SERVICE_START_NAME : LocalSystem

References:

https://isc.sans.edu/diary/Help+eliminate+unquoted+path+vulnerabilities/14464


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top