Windows 漏洞

Windows 漏洞

漏洞ID 1108282 漏洞类型 未知
发布时间 2004-11-19 更新时间 2005-05-16
图片[1]-Windows 漏洞-安全小百科CVE编号 CVE-2005-1590
图片[2]-Windows 漏洞-安全小百科CNNVD-ID CNNVD-200505-1067
漏洞平台 Windows CVSS评分 4.6
|漏洞来源
https://www.exploit-db.com/exploits/24754
https://www.securityfocus.com/bid/89969
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200505-1067
|漏洞详情
Windows(ACLIENT.EXE)6.0.88的AltirisClientService允许本地用户通过查出并显示”AltirisClientService”隐藏窗口,禁用密码保护,禁用”Hideclienttrayiconbox”选项,再打开AClienttray图标并使用ViewLogFile选项,来禁用密码保护并访问管理员界面。是不同于CVE-2004-2070的漏洞。
|漏洞EXP
source: http://www.securityfocus.com/bid/11709/info

Altiris Deployment Solution Client allows a user to activate the client interface by easily launching the software from an icon in the Windows system tray. It is reported that a local user may exploit the client interface to escalate privileges.

It should be noted that although this vulnerability is reported to exist in Altiris Deployment Solution version 5.6 SP1 (Hotfix E) other versions might also be affected.

1. Right click on the Altiris Client Service icon in the Taskbar and choose View Log File
2. Notepad should open. Click File, click Open
3. In the Files of type: field choose All Files
4. Navagate to '%WINDIR%System32'. Right click on 'cmd.exe' and choose Open
6. A new command shell with launch with SYSTEM privileges
|受影响的产品
Altiris Client Service 6.0.88 Windows

+

Altiris Client Management Suite

|参考资料

来源:OSVDB
名称:15897
链接:http://www.osvdb.org/15897
来源:SECUNIA
名称:15159
链接:http://secunia.com/advisories/15159
来源:FULLDISC
名称:20050427PrivilegeescalationandpasswordprotectionbypassinAltirisClientServiceforWindows(Version6.0.88)
链接:http://archives.neohapsis.com/archives/fulldisclosure/2005-04/0614.html

相关推荐: Phorum回复电子邮件地址脚本注入漏洞

Phorum回复电子邮件地址脚本注入漏洞 漏洞ID 1203380 漏洞类型 跨站脚本 发布时间 2002-12-31 更新时间 2002-12-31 CVE编号 CVE-2002-2340 CNNVD-ID CNNVD-200212-372 漏洞平台 N/A…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享