ID

VAR-E-201312-0128


CVE

cve_id:CVE-2014-8358

Trust: 2.4

cve_id:CVE-2014-8359

Trust: 1.8

sources: BID: 70671 // BID: 70672 // PACKETSTORM: 128767 // EXPLOIT-DB: 30477 // EDBNET: 52121

EDB ID

30477


TITLE

Huawei Technologies du Mobile Broadband 16.0 - Local Privilege Escalation - Windows local Exploit

Trust: 0.6

sources: EXPLOIT-DB: 30477

DESCRIPTION

Huawei Technologies du Mobile Broadband 16.0 - Local Privilege Escalation. CVE-90090CVE-2014-8359CVE-2014-8358 . local exploit for Windows platform

Trust: 0.6

sources: EXPLOIT-DB: 30477

AFFECTED PRODUCTS

vendor:huaweimodel:du mobile broadbandscope:eqversion:16.0

Trust: 2.1

vendor:huaweimodel:mobile partnerscope: - version: -

Trust: 0.5

sources: PACKETSTORM: 124557 // PACKETSTORM: 128767 // EXPLOIT-DB: 30477 // EDBNET: 52121

EXPLOIT

Huawei Technologies du Mobile Broadband 16.0 Local Privilege Escalation

Vendor: Huawei Technologies Co., Ltd.
Product Web Page: http://www.huawei.com
Affected version: 16.002.03.16.124

Summary: du Mobile Broadband is a shareware application for
du EITC UAE users to support mobile broadband (3G) activation
for du service provider with systems containing one of the
supported devices. It lets you access du wireless internet
wherever you are and whenever you need it, all powered through
your mobile data SIM or simply by connecting your 3G USB stick
to your device.

Desc: The application is vulnerable to an elevation of privileges
vulnerability which can be used by a simple user that can change
the executable file with a binary of choice. The vulnerability
exist due to the improper permissions, with the 'F' flag (full)
for the 'Everyone' and 'Users' group, for the 'du Mobile Broadband.exe'
binary file. The files are installed in the 'du Mobile Broadband'
directory which has the Everyone group assigned to it with full
permissions making every single file inside vulnerable to change
by any user on the affected machine. After you replace the binary
with your rootkit, on reboot you get SYSTEM privileges.

Tested on: Microsoft Windows 7 Ultimate (EN) 64bit

Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
@zeroscience

Advisory ID: ZSL-2013-5164
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5164.php

18.12.2013

---

C:\Program Files (x86)>cacls "du Mobile Broadband"
C:\Program Files (x86)\du Mobile Broadband Everyone:(OI)(CI)F
BUILTIN\Users:(OI)(IO)F
BUILTIN\Users:(CI)F
NT SERVICE\TrustedInstaller:(ID)F
NT SERVICE\TrustedInstaller:(CI)(IO)(ID)F
NT AUTHORITY\SYSTEM:(ID)F
NT AUTHORITY\SYSTEM:(OI)(CI)(IO)(ID)F
BUILTIN\Administrators:(ID)F
BUILTIN\Administrators:(OI)(CI)(IO)(ID)F
CREATOR OWNER:(OI)(CI)(IO)(ID)F

C:\Program Files (x86)>cd "du Mobile Broadband"

C:\Program Files (x86)\du Mobile Broadband>cacls "du Mobile Broadband.exe"
C:\Program Files (x86)\du Mobile Broadband\du Mobile Broadband.exe Everyone:F
BUILTIN\Users:F
NT AUTHORITY\SYSTEM:(ID)F
BUILTIN\Administrators:(ID)F

C:\Program Files (x86)\du Mobile Broadband>

Trust: 1.0

sources: EXPLOIT-DB: 30477

EXPLOIT LANGUAGE

txt

Trust: 0.6

sources: EXPLOIT-DB: 30477

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 30477

TYPE

Local Privilege Escalation

Trust: 1.6

sources: EXPLOIT-DB: 30477 // EDBNET: 52121

TAGS

tag:exploit

Trust: 1.0

tag:local

Trust: 0.5

sources: PACKETSTORM: 124557 // PACKETSTORM: 128767

CREDITS

LiquidWorm

Trust: 0.6

sources: EXPLOIT-DB: 30477

EXTERNAL IDS

db:ZSLid:ZSL-2013-5164

Trust: 2.7

db:NVDid:CVE-2014-8358

Trust: 2.4

db:NVDid:CVE-2014-8359

Trust: 1.8

db:EXPLOIT-DBid:30477

Trust: 1.6

db:EDBNETid:77496

Trust: 0.6

db:EDBNETid:52121

Trust: 0.6

db:PACKETSTORMid:124557

Trust: 0.5

db:PACKETSTORMid:128767

Trust: 0.5

db:BIDid:70671

Trust: 0.3

db:BIDid:70672

Trust: 0.3

sources: BID: 70671 // BID: 70672 // PACKETSTORM: 124557 // PACKETSTORM: 128767 // EXPLOIT-DB: 30477 // EDBNET: 77496 // EDBNET: 52121

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2014-8358

Trust: 2.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-8359

Trust: 1.5

url:http://www.zeroscience.mk/en/vulnerabilities/zsl-2013-5164.php

Trust: 1.0

url:http://huaweinews.com/2013/08/download-mobile-partner-latest/

Trust: 0.6

url:http://www.huawei.com

Trust: 0.6

url:http://osandamalith.wordpress.com/2014/10/20/escalating-local-privileges-using-mobile-partner/

Trust: 0.6

url:https://www.intelligentexploit.com

Trust: 0.6

url:https://www.exploit-db.com/exploits/30477/

Trust: 0.6

url:http://blogs.technet.com/b/msrc/archive/2010/08/21/microsoft-security-advisory-2269637-released.aspx

Trust: 0.3

url:http://blog.metasploit.com/2010/08/exploiting-dll-hijacking-flaws.html

Trust: 0.3

url:http://blogs.technet.com/b/srd/archive/2010/08/23/more-information-about-dll-preloading-remote-attack-vector.aspx

Trust: 0.3

url:http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-376152.htm

Trust: 0.3

url:http://www.attackvector.org/new-dll-hijacking-exploits-many/

Trust: 0.3

url:http://blog.rapid7.com/?p=5325

Trust: 0.3

url:http://www.microsoft.com/technet/security/advisory/2269637.mspx

Trust: 0.3

url:http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-376152.htm

Trust: 0.3

sources: BID: 70671 // BID: 70672 // PACKETSTORM: 128767 // EXPLOIT-DB: 30477 // EDBNET: 77496 // EDBNET: 52121

SOURCES

db:BIDid:70671
db:BIDid:70672
db:PACKETSTORMid:124557
db:PACKETSTORMid:128767
db:EXPLOIT-DBid:30477
db:EDBNETid:77496
db:EDBNETid:52121

LAST UPDATE DATE

2022-07-27T10:03:14.085000+00:00


SOURCES UPDATE DATE

db:BIDid:70671date:2015-03-19T08:38:00
db:BIDid:70672date:2015-03-19T09:15:00

SOURCES RELEASE DATE

db:BIDid:70671date:2014-10-20T00:00:00
db:BIDid:70672date:2014-10-20T00:00:00
db:PACKETSTORMid:124557date:2013-12-20T19:02:22
db:PACKETSTORMid:128767date:2014-10-21T00:00:22
db:EXPLOIT-DBid:30477date:2013-12-24T00:00:00
db:EDBNETid:77496date:2013-12-20T00:00:00
db:EDBNETid:52121date:2013-12-24T00:00:00