CVE-2015-7985 : Détail

CVE-2015-7985

A01-Broken Access Control
0.1%V3
Local
2015-11-24
19h00 +00:00
2018-10-09
16h57 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

Valve Steam 2.10.91.91 uses weak permissions (Users: read and write) for the Install folder, which allows local users to gain privileges via a Trojan horse steam.exe file.

Informations du CVE

Faiblesses connexes

CWE-ID Nom de la faiblesse Source
CWE-276 Incorrect Default Permissions
During installation, installed file permissions are set to allow anyone to modify those files.

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 7.2 AV:L/AC:L/Au:N/C:C/I:C/A:C [email protected]

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 9386

Date de publication : 2009-08-06 22h00 +00:00
Auteur : MrDoug
EDB Vérifié : Yes

Steam (Multiple .exe's) Local Privilage Escalation By: MrDoug mrdoug13[at]gmail[dot]com Version Info: Steam windows client Built: Jun 30 2009, at 13:29:32 Steam API: v008 Steam Package versions: 54/894 Greetz: Slappywag, Doomchip, Bolo, Eliwood, and the rest. Special Thanks: Jeremy Brown and Nine:Situations:Group... Their work led me to this. ================================================== The latest Steam client, (and other Steam related executables) suffer the same privilage escelation issue we saw in Adobe Acrobat NOS the other day (http://milw0rm.com/exploits/9199). This is particularly bad becuase, by default, Steam starts atomaticly. That means that as soon as an administrator logs in... game over. ================================================== POC: C:\>cacls "C:\Program Files\Steam\Steam.exe" C:\Program Files\Steam\Steam.exe BUILTIN\Users:F <-- (Danger Will Robinson!!) BUILTIN\Power Users:C BUILTIN\Administrators:F NT AUTHORITY\SYSTEM:F The executables listed below are also vulnerable, as well as many, MANY more that I have not mentioned. See for yourself. %programfiles%\Steam\uninstall_css.exe %programfiles%\Steam\Unwise32.exe %programfiles%\Steam\GameOverlayUI.exe %programfiles%\Steam\uninstall_steam.exe %programfiles%\Steam\WriteMiniDump.exe %programfiles%\Steam\bin\SteamService.exe --The following are dependant on what games are installed. %programfiles%\Steam\common\audiosurf\Audiosurf.exe %programfiles%\Steam\common\audiosurf\testapp.exe %programfiles%\Steam\common\audiosurf\engine\QuestViewer.exe %programfiles%\Steam\common\left 4 dead\left4dead.exe %programfiles%\Steam\steamapps\[username]\counter-strike source\hl2.exe %programfiles%\Steam\steamapps\[username]\half-life 2\hl2.exe %programfiles%\Steam\steamapps\[username]\garrysmod\hl2.exe ...etc...etc...etc... There are probably 100 more, just look around. I am yet to see an executable in the Steam directory with propor permissions. ================================================== Exploit: So simple... write it yourself you silly goose :3 # milw0rm.com [2009-08-07]

Products Mentioned

Configuraton 0

Valvesoftware>>Steam_client >> Version 2.10.91.91

Références