MicroWorld eScan Products Local Privilege Escalation Vulnerability
Multiple MicroWorld eScan products are vulnerable to a local privilege-escalation vulnerability because of insecure default file permissions. Attackers can exploit this issue to execute arbitrary code with SYSTEM-level privileges. Successful attacks will completely compromise affected computers. The following are vulnerable: eScan Internet Security 9.0.722.1, eScan Virus Control 9.0.722.1, eScan AntiVirus 9.0.722.1, eScan Corporate 9.0.x, eScan Professional 9.0.x, eScan Workstation Server 9.0.x, eScan Web and Mail Filter 9.0.x, MailScan for Mail-Server 5.6a, MailScan for SMTP Server 5.6a, X-Spam for SMTP Servers 5.6a. Other versions and software packages may also be affected. Attackers can exploit this issue by logging in as a LUA user, renaming traysser.exe to traysser.exe.BAK, copying program.exe to the eScan installation directory, renaming program.exe to traysser.exe, and restarting the computer.