SopCast 3.4.7 (Diagnose.exe) Improper Permissions
Title: SopCast 3.4.7 (Diagnose.exe) Improper Permissions
Advisory ID: ZSL-2011-5062
Type: Local
Impact: Privilege Escalation
Risk: (3/5)
Release Date: 05.12.2011
[01.12.2011] Contact with the vendor with sent detailed info.
[04.12.2011] No response from the vendor.
[05.12.2011] Public security advisory released.
[2] http://secunia.com/advisories/40940/
[3] http://xforce.iss.net/xforce/xfdb/71622
[4] http://www.securityfocus.com/bid/50908
[5] http://packetstormsecurity.org/files/107527/ZSL-2011-5062.txt
[6] http://securityreason.com/exploitalert/11022
[7] http://osvdb.org/show/osvdb/77724
[8] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5044
[06.12.2011] - Added reference [3], [4] and [5]
[08.12.2011] - Added reference [6]
[15.12.2011] - Added reference [7]
[15.01.2012] - Added reference [8]
Web: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk
Advisory ID: ZSL-2011-5062
Type: Local
Impact: Privilege Escalation
Risk: (3/5)
Release Date: 05.12.2011
Summary
SopCast is a simple, free way to broadcast video and audio or watch the video and listen to radio on the Internet. Adopting P2P(Peer-to-Peer) technology, It is very efficient and easy to use. SoP is the abbreviation for Streaming over P2P. Sopcast is a Streaming Direct Broadcasting System based on P2P. The core is the communication protocol produced by Sopcast Team, which is named sop://, or SoP technology.Description
SopCast is vulnerable to an elevation of privileges vulnerability which can be used by a simple user that can change the executable file with a binary of choice. The vulnerability exist due to the improper permissions, with the 'F' flag (full control) for the 'Everyone' group, for the 'Diagnose.exe' binary file which is bundled with the SopCast installation package.Vendor
SopCast.com - http://www.sopcast.comAffected Version
3.4.7.45585Tested On
Microsoft Windows XP Professional SP3 (EN)Vendor Status
[30.11.2011] Vulnerability discovered.[01.12.2011] Contact with the vendor with sent detailed info.
[04.12.2011] No response from the vendor.
[05.12.2011] Public security advisory released.
PoC
sopcast_priv.txtCredits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>References
[1] http://www.exploit-db.com/exploits/18201/[2] http://secunia.com/advisories/40940/
[3] http://xforce.iss.net/xforce/xfdb/71622
[4] http://www.securityfocus.com/bid/50908
[5] http://packetstormsecurity.org/files/107527/ZSL-2011-5062.txt
[6] http://securityreason.com/exploitalert/11022
[7] http://osvdb.org/show/osvdb/77724
[8] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5044
Changelog
[05.12.2011] - Initial release[06.12.2011] - Added reference [3], [4] and [5]
[08.12.2011] - Added reference [6]
[15.12.2011] - Added reference [7]
[15.01.2012] - Added reference [8]
Contact
Zero Science LabWeb: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk