Huawei Technologies eSpace Meeting Service 1.0.0.23 Local Privilege Escalation

Title: Huawei Technologies eSpace Meeting Service 1.0.0.23 Local Privilege Escalation
Advisory ID: ZSL-2014-5171
Type: Local
Impact: Privilege Escalation
Risk: (3/5)
Release Date: 10.03.2014
Summary
Huawei's eSpace Meeting solution fully meets the needs of enterprise customers for an integrated daily collaboration system by integrating the conference server, conference video terminal, conference user authorization, and teleconference.
Description
The application is vulnerable to an elevation of privileges vulnerability which can be used by a simple user that can change the executable file with a binary of choice. The vulnerability exist due to the improper permissions, with the 'F' flag (full) for the 'Users' group, for the 'eMservice.exe' binary file. The service is installed by default to start on system boot with LocalSystem privileges. Attackers can replace the binary with their rootkit, and on reboot they get SYSTEM privileges.
Vendor
Huawei Technologies Co., Ltd. - http://www.huawei.com
Affected Version
1.0.0.23 (V100R001C03SPC201B050)
Tested On
Microsoft Windows 7 Professional SP1 (EN)
Vendor Status
[18.01.2014] Vulnerability discovered.
[20.01.2014] Vendor contacted with sent detailed info.
[20.01.2014] Vendor responds, analyzing the issue.
[22.01.2014] Vendor confirms the vulnerability.
[27.01.2014] Working with the vendor.
[08.02.2014] Asked vendor for status update.
[10.02.2014] Vendor responds with scheduled patch release date.
[07.03.2014] Vendor releases version V100R001C03SPC202 to address this issue.
[10.03.2014] Coordinated public security advisory released.
PoC
espacemeet_priv.txt
Credits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>
References
[1] http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-329170.htm
[2] http://cxsecurity.com/issue/WLB-2014030081
[3] http://packetstormsecurity.com/files/125638
[4] http://secunia.com/advisories/57225/
[5] http://www.securityfocus.com/bid/66107
[6] http://osvdb.org/show/osvdb/104323
[7] http://www.exploit-db.com/exploits/32205/
Changelog
[10.03.2014] - Initial release
[11.03.2014] - Added reference [2], [3], [4] and [5]
[12.03.2014] - Added reference [6] and [7]
Contact
Zero Science Lab

Web: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk