Microsoft Windows Tracing function registry ACL insecure permission vulnerability (MS10-059) and repair

Source: Internet
Author: User

Affected Versions:
Microsoft Windows Vista SP2
Microsoft Windows Vista SP1
Microsoft Windows Server 2008 SP2
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2008
Microsoft Windows 7 vulnerability description:
Bugtraq id: 42269
CVE (CAN) ID: CVE-2010-2554

Microsoft Windows is a very popular operating system released by Microsoft.

Some Windows applications use the Tracing function to record debugging information. This function is not enabled by default. To enable this function, you must edit the registry value under the HKEY_LOCAL_MACHINESOFTWAREMicrosoftTracing key. Windows processes that use this Tracing function will continuously monitor the changes in the related sub-keys. Once the registry value changes, it will be read immediately. One of the registry values is FileDirectory, which contains the Windows directory name. When a service running by the Local System account is connected to the MPs queue, a Local user with the assumed permission can escalate the permission by assuming the Local System account (or Administrator or another privileged account. The Set Value permission is enabled for the Users Group. Therefore, any authenticated user can Set any Value. <* Reference
Cesar Cerrudo (cesarc56@yahoo.com)

Link: http://secunia.com/advisories/40817/
Http://www.argeniss.com/research/ARGENISS-ADV-081002.txt
Http://www.microsoft.com/technet/security/bulletin/MS10-059.mspx? Pf = true
Http://www.us-cert.gov/cas/techalerts/TA10-222A.html
*>
Test method:

The Program (method) provided on this site may be offensive and only used for security research and teaching. You are at your own risk!
Source: http://www.securityfocus.com/bid/42269/info

Microsoft Windows is prone to a local privilege-escalation vulnerability.

An attacker can exploit this issue to execute arbitrary code with SYSTEM-level privileges. Successful exploits will result in the complete compromise of affected computers.

Code:
Http://www.exploit-db.com/sploits/Chimichurri-CVE-2010-2554.zip
Vendor patch:

Microsoft
---------
Microsoft has released a Security Bulletin (MS10-059) and patches for this:
MS10-059: Vulnerabilities in the Tracing Feature for Services cocould Allow Elevation of Privilege (982799)
Link: http://www.microsoft.com/technet/security/bulletin/MS10-059.mspx? Pf = true

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.