Affected Versions:
Microsoft Windows Vista SP2
Microsoft Windows Vista SP1
Microsoft Windows Server 2008 SP2
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2008
Microsoft Windows 7 vulnerability description:
Bugtraq id: 42269
CVE (CAN) ID: CVE-2010-2554
Microsoft Windows is a very popular operating system released by Microsoft.
Some Windows applications use the Tracing function to record debugging information. This function is not enabled by default. To enable this function, you must edit the registry value under the HKEY_LOCAL_MACHINESOFTWAREMicrosoftTracing key. Windows processes that use this Tracing function will continuously monitor the changes in the related sub-keys. Once the registry value changes, it will be read immediately. One of the registry values is FileDirectory, which contains the Windows directory name. When a service running by the Local System account is connected to the MPs queue, a Local user with the assumed permission can escalate the permission by assuming the Local System account (or Administrator or another privileged account. The Set Value permission is enabled for the Users Group. Therefore, any authenticated user can Set any Value. <* Reference
Cesar Cerrudo (cesarc56@yahoo.com)
Link: http://secunia.com/advisories/40817/
Http://www.argeniss.com/research/ARGENISS-ADV-081002.txt
Http://www.microsoft.com/technet/security/bulletin/MS10-059.mspx? Pf = true
Http://www.us-cert.gov/cas/techalerts/TA10-222A.html
*>
Test method:
The Program (method) provided on this site may be offensive and only used for security research and teaching. You are at your own risk!
Source: http://www.securityfocus.com/bid/42269/info
Microsoft Windows is prone to a local privilege-escalation vulnerability.
An attacker can exploit this issue to execute arbitrary code with SYSTEM-level privileges. Successful exploits will result in the complete compromise of affected computers.
Code:
Http://www.exploit-db.com/sploits/Chimichurri-CVE-2010-2554.zip
Vendor patch:
Microsoft
---------
Microsoft has released a Security Bulletin (MS10-059) and patches for this:
MS10-059: Vulnerabilities in the Tracing Feature for Services cocould Allow Elevation of Privilege (982799)
Link: http://www.microsoft.com/technet/security/bulletin/MS10-059.mspx? Pf = true