what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

AD20070108.txt

AD20070108.txt
Posted Jan 13, 2007
Authored by Sowhat | Site nevisnetworks.com

There is a DACL weakness that exists in the HP all-in-one products drivers, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
SHA-256 | 4cdf87116b8d9ee3c3f00f60c40288c8b169a7243a24ee7362d44092701f936f

AD20070108.txt

Change Mirror Download
HP Multiple Products PML Driver Local Privilege Escalation


By Sowhat of Nevis Labs
2007.01.08

https://www.nevisnetworks.com
https://secway.org/advisory/AD20070108.txt

Vendor
Hewlett-Packard

Products Affected

HP All-In-One products
HP PSC 700 series
HP PSC 900 series
HP PSC 1100 series
HP PSC 1200 series
HP PSC 1300 series
HP PSC 2100 series
HP PSC 2200 series
HP PSC 2400 Photosmart All-in-one series
HP PSC 2500 Photosmart All-in-one series
HP Officejet D series
HP Officejet G series
HP Officejet K series
HP Officejet 4100 series
HP Officejet 5100 series
HP Officejet 5500 series
HP Officejet 6100 series
HP Officejet 7100 series
HP Color LaserJet 4650 Printer series

and ??? most probably other products are affected




Overview:

There is a DACL weakness exists in the HP all-in-one products drivers,
which can be exploited by malicious, local users to gain escalated
privileges.


Details:

"PML Driver HPZ12" service is installed by lots of the HP products especially
the all-in-one products and some other Printers,Scanners,and Copiers.

Insecure SERVICE_CHANGE_CONFIG permissions on the "PML Driver HPZ12" service
can be exploited to gain escalated privileges by changing the associated
program.

The "PML Driver HPZ12" is defaultly installed with the following properties:
Name: PML Driver HPZ12
Filename: HPZipm12.exe
Description: Used by HP Printer/Scanner/Copier printers to prevent Windows
from entering hibernation mode.
File Location: %System%
Service Name: PML Driver HPZ12
Service Display Name: PML Driver HPZ12


Because of the Insecure DACL, a local unprivileged user can obtain SYSTEM
privilege through the following way:

C:\sc config "pml driver hpz12" binpath= D:\attack\attack.exe
C:\sc start "pml driver hpz12"

OK, your attack.exe will be lunached under SYSTEM privileges immediately,
system restart is not required.

Even though the PML Driver serivce is not started by default, the attacker
can start and stop it by herself :)


Exploting this vulnerability allows local non-privileged user
to obtain SYSTEM privilege.


Workaround:
Use SC command to set a tight permissions for the "PML Driver HPZ12" service.



Vendor Response:

2006.05.29 Vendor notified via security-alert@hp.com
2006.05.29 Vendor responded
2006.07.20 HP -> "This is a high priority issue, and is still being
worked. There are testing
dependencies that are wider than we expected."
2006.12.20 I saw the an auto update of HP software named "PML Driver
Security Update",
so I sent an email to ask about when it was released, why
they did not let me know.
they said "There has been a communication problem here at
HP, We have not yet issue
a security bulletin on this problem "
2007.01.08 They did not response to my status query emails after 20th, Dec

Is this HP's Responsible Vulnerability Disclosure Policy?

--
Sowhat
https://secway.org
"Life is like a bug, Do you know how to exploit it ?"
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close