Exploit/Advisories Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on July 21st, 2019 📆 | 4949 Views ⚑

0

Microsoft File Checksum Integrity Verifier 2.05 DLL Loader fciv.exe privilege escalation


iSpeech

CVSS Meta Temp Score Current Exploit Price (β‰ˆ)
4.9 $0-$5k

A vulnerability was found in Microsoft File Checksum Integrity Verifier 2.05. It has been classified as critical. Affected is an unknown function of the file fciv.exe of the component DLL Loader. The manipulation with an unknown input leads to a privilege escalation vulnerability. CWE is classifying the issue as CWE-269. This is going to have an impact on confidentiality, integrity, and availability.

The weakness was published 07/04/2019 by John Page (hyp3rlinx) as unconfirmed advisory (Website). The advisory is available at hyp3rlinx.altervista.org. Local access is required to approach this attack. The successful exploitation requires a single authentication. Technical details and a public exploit are known.

It is declared as proof-of-concept. The exploit is shared for download at hyp3rlinx.altervista.org. The vulnerability was handled as a non-public zero-day exploit for at least 31 days. During that time the estimated underground price was around $5k-$25k. The code used by the exploit is:

"evil.c"

#include 
//gcc -shared -o cryptsp.dll evil.c

void evilo(void){
WinExec("calc", 0);
}

BOOL WINAPI DllMain(HINSTANCE hinstDLL, DWORD fdwReason, LPVOID lpvReserved){
evilo();
return 0;
}

There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

Vendor

Name

VulDB Meta Base Score: 5.3
VulDB Meta Temp Score: 4.9

VulDB Base Score: 5.3
VulDB Temp Score: 4.9
VulDB Vector: πŸ”’
VulDB Reliability: πŸ”

AV AC Au C I A
πŸ” πŸ” πŸ” πŸ” πŸ” πŸ”
πŸ” πŸ” πŸ” πŸ” πŸ” πŸ”
πŸ” πŸ” πŸ” πŸ” πŸ” πŸ”
Vector Complexity Authentication Confidentiality Integrity Availability
unlock unlock unlock unlock unlock unlock
unlock unlock unlock unlock unlock unlock
unlock unlock unlock unlock unlock unlock


VulDB Base Score: πŸ”’
VulDB Temp Score: πŸ”’
VulDB Reliability: πŸ”
Class: Privilege escalation (CWE-269)
Local: Yes
Remote: No

Availability: πŸ”’
Access: Public
Status: Proof-of-Concept
Download: πŸ”’





Price Prediction: πŸ”
Current Price Estimation: πŸ”’


0-Day unlock unlock unlock unlock
Today unlock unlock unlock unlock

Threat Intelligenceinfoedit

Threat: πŸ”
Adversaries: πŸ”
Geopolitics: πŸ”
Economy: πŸ”
Predictions: πŸ”
Remediation: πŸ”Recommended: no mitigation known
Status: πŸ”

0-Day Time: πŸ”’

06/03/2019 Vendor informed
06/07/2019 +4 days Vendor acknowledged
07/04/2019 +27 days Advisory disclosed
07/21/2019 +17 days VulDB entry created
07/21/2019 +0 days VulDB last updateVendor: microsoft.com

Advisory: hyp3rlinx.altervista.org
Researcher: John Page (hyp3rlinx)
Status: Unconfirmed

Created: 07/21/2019 10:37 AM
Complete: πŸ”
Submitter: hyp3rlinx

Comments

No comments yet. Please log in to comment.

See the underground prices here!

https://vuldb.com/?id.138390

Tagged with: β€’ β€’ β€’ β€’ β€’ β€’



Comments are closed.