Published on July 21st, 2019 📆 | 4949 Views ⚑
0Microsoft File Checksum Integrity Verifier 2.05 DLL Loader fciv.exe privilege escalation
CVSS Meta Temp Score | Current Exploit Price (β) |
---|---|
4.9 | $0-$5k |
A vulnerability was found in Microsoft File Checksum Integrity Verifier 2.05. It has been classified as critical. Affected is an unknown function of the file fciv.exe of the component DLL Loader. The manipulation with an unknown input leads to a privilege escalation vulnerability. CWE is classifying the issue as CWE-269. This is going to have an impact on confidentiality, integrity, and availability.
The weakness was published 07/04/2019 by John Page (hyp3rlinx) as unconfirmed advisory (Website). The advisory is available at hyp3rlinx.altervista.org. Local access is required to approach this attack. The successful exploitation requires a single authentication. Technical details and a public exploit are known.
It is declared as proof-of-concept. The exploit is shared for download at hyp3rlinx.altervista.org. The vulnerability was handled as a non-public zero-day exploit for at least 31 days. During that time the estimated underground price was around $5k-$25k. The code used by the exploit is:
"evil.c" #include //gcc -shared -o cryptsp.dll evil.c void evilo(void){ WinExec("calc", 0); } BOOL WINAPI DllMain(HINSTANCE hinstDLL, DWORD fdwReason, LPVOID lpvReserved){ evilo(); return 0; }
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Vendor
Name
VulDB Meta Base Score: 5.3
VulDB Meta Temp Score: 4.9
VulDB Base Score: 5.3
VulDB Temp Score: 4.9
VulDB Vector: π
VulDB Reliability: π
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
π | π | π | π | π | π |
π | π | π | π | π | π |
π | π | π | π | π | π |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: π
VulDB Temp Score: π
VulDB Reliability: π
Class: Privilege escalation (CWE-269)
Local: Yes
Remote: No
Availability: π
Access: Public
Status: Proof-of-Concept
Download: π
Price Prediction: π
Current Price Estimation: π
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Threat: π
Adversaries: π
Geopolitics: π
Economy: π
Predictions: π
Remediation: πRecommended: no mitigation known
Status: π
0-Day Time: π
06/03/2019 Vendor informed
06/07/2019 Vendor acknowledged
07/04/2019 Advisory disclosed
07/21/2019 VulDB entry created
07/21/2019 VulDB last updateVendor: microsoft.com
Advisory: hyp3rlinx.altervista.org
Researcher: John Page (hyp3rlinx)
Status: Unconfirmed
Created: 07/21/2019 10:37 AM
Complete: π
Submitter: hyp3rlinx
Comments
See the underground prices here!
https://vuldb.com/?id.138390
No comments yet. Please log in to comment.