Thursday, November 25, 2010

New Windows (working in XP/Vista/7) zero-day flaw bypasses UAC [privilege escalation exploit]

A new privilege escalation exploit has been unraveled. To execute the attack, just download a file & execute the file poc.exe. Your non-administrator user account will be promoted to administrator. See the picture.



The exploit takes advantage of a bug in win32k.sys, which is part of the Windows kernel. The flaw is related to a registry key which allows an attacker to gain administrative level access. The key has access to almost all windows components & is under full control of the non-administrator users.
The flaw works on XP/vista/7. The bug is not executed through remote code execution. But allows normal users to gain administrative level access.
To prevent the flaw from being exploited you can perform the following actions:
  1. As an Administrator open Regedit and browse to HKEY_USERS\[SID of each user account]\EUDC
  2. Right-click EUDC and choose permissions
  3. Choose the user whose account you are modifying and select Advanced
  4. Select Add and then type in the user's name and click OK
  5. Click the Deny checkbox for Delete and Create Subkey
  6. Click all the OKs and Apply buttons to exit
References:
http://nakedsecurity.sophos.com/2010/11/25/new-windows-zero-day-flaw-bypasses-uac/
http://isc.sans.edu/diary.html?storyid=9988&rss
http://softwareobjects.net/technology/other/bypassing-uac-with-user-privilege-under-windows-vista7/
 http://www.exploit-db.com/exploits/15609/

No comments:

Post a Comment