Lucene search

K
zeroscienceGjoko KrsticZSL-2014-5171
HistoryMar 10, 2014 - 12:00 a.m.

Huawei Technologies eSpace Meeting Service 1.0.0.23 Local Privilege Escalation

2014-03-1000:00:00
Gjoko Krstic
zeroscience.mk
18

6.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:C/I:C/A:P

7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

27.8%

Title: Huawei Technologies eSpace Meeting Service 1.0.0.23 Local Privilege Escalation
Advisory ID: ZSL-2014-5171
Type: Local
Impact: Privilege Escalation
Risk: (3/5)
Release Date: 10.03.2014

Summary

Huawei’s eSpace Meeting solution fully meets the needs of enterprise customers for an integrated daily collaboration system by integrating the conference server, conference video terminal, conference user authorization, and teleconference.

Description

The application is vulnerable to an elevation of privileges vulnerability which can be used by a simple user that can change the executable file with a binary of choice. The vulnerability exist due to the improper permissions, with the ‘F’ flag (full) for the ‘Users’ group, for the ‘eMservice.exe’ binary file. The service is installed by default to start on system boot with LocalSystem privileges. Attackers can replace the binary with their rootkit, and on reboot they get SYSTEM privileges.

Vendor

Huawei Technologies Co., Ltd. - <http://www.huawei.com>

Affected Version

1.0.0.23 (V100R001C03SPC201B050)

Tested On

Microsoft Windows 7 Professional SP1 (EN)

Vendor Status

[18.01.2014] Vulnerability discovered.
[20.01.2014] Vendor contacted with sent detailed info.
[20.01.2014] Vendor responds, analyzing the issue.
[22.01.2014] Vendor confirms the vulnerability.
[27.01.2014] Working with the vendor.
[08.02.2014] Asked vendor for status update.
[10.02.2014] Vendor responds with scheduled patch release date.
[07.03.2014] Vendor releases version V100R001C03SPC202 to address this issue.
[10.03.2014] Coordinated public security advisory released.

PoC

espacemeet_priv.txt

Credits

Vulnerability discovered by Gjoko Krstic - <[email protected]>

References

[1] <http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-329170.htm&gt;
[2] <http://cxsecurity.com/issue/WLB-2014030081&gt;
[3] <http://packetstormsecurity.com/files/125638&gt;
[4] <http://secunia.com/advisories/57225/&gt;
[5] <http://www.securityfocus.com/bid/66107&gt;
[6] <http://osvdb.org/show/osvdb/104323&gt;
[7] <http://www.exploit-db.com/exploits/32205/&gt;
[8] <https://vulners.com/cve/CVE-2014-3222&gt;
[9] <https://nvd.nist.gov/vuln/detail/CVE-2014-3222&gt;

Changelog

[10.03.2014] - Initial release
[11.03.2014] - Added reference [2], [3], [4] and [5]
[12.03.2014] - Added reference [6] and [7]
[21.10.2021] - Added reference [8] and [9]

Contact

Zero Science Lab

Web: <http://www.zeroscience.mk>
e-mail: [email protected]

<html><body><p>Huawei Technologies eSpace Meeting Service 1.0.0.23 Local Privilege Escalation


Vendor: Huawei Technologies Co., Ltd.
Product web page: http://www.huawei.com
Affected version: 1.0.0.23 (V100R001C03SPC201B050)

Summary: Huawei's eSpace Meeting solution fully meets the needs of enterprise
customers for an integrated daily collaboration system by integrating the
conference server, conference video terminal, conference user authorization,
and teleconference.

Desc: The application is vulnerable to an elevation of privileges vulnerability
which can be used by a simple user that can change the executable file with a
binary of choice. The vulnerability exist due to the improper permissions, with
the 'F' flag (full) for the 'Users' group, for the 'eMservice.exe' binary file.
The service is installed by default to start on system boot with LocalSystem
privileges. Attackers can replace the binary with their rootkit, and on reboot
they get SYSTEM privileges.

Tested on: Microsoft Windows 7 Professional SP1 (EN)


Vulnerbility discovered by Gjoko 'LiquidWorm' Krstic
                           @zeroscience


Advisory ID: ZSL-2014-5171
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5171.php

Huawei ID: Huawei-SA-20140310-01
Huawei Advisory: http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-329170.htm



18.01.2014

------------------------------------

C:\&gt;sc qc eSpaceMeeting
[SC] QueryServiceConfig SUCCESS

SERVICE_NAME: eSpaceMeeting
        TYPE               : 110  WIN32_OWN_PROCESS (interactive)
        START_TYPE         : 2   AUTO_START
        ERROR_CONTROL      : 1   NORMAL
        BINARY_PATH_NAME   : C:\ProgramData\eSpaceMeeting\eMservice.exe
        LOAD_ORDER_GROUP   :
        TAG                : 0
        DISPLAY_NAME       : eSpaceMeeting
        DEPENDENCIES       :
        SERVICE_START_NAME : LocalSystem

C:\&gt;icacls ProgramData\eSpaceMeeting\eMservice.exe
ProgramData\eSpaceMeeting\eMservice.exe BUILTIN\Users:(I)(F)
                                        NT AUTHORITY\SYSTEM:(I)(F)
                                        BUILTIN\Administrators:(I)(F)

Successfully processed 1 files; Failed processing 0 files

C:\&gt;

------------------------------------
</p></body></html>

6.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:C/I:C/A:P

7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

27.8%

Related for ZSL-2014-5171