The Realtek High Definition Audio Driver installs a service with an unquoted service path, which enables a local privilege escalation vulnerability. To exploit this vulnerability, a local attacker can insert an executable file in the path of the service. Rebooting the system or restarting the service will run the malicious executable with elevated privileges.
PDF Complete Corporate Edition installs a service with an unquoted service path, which enables a local privilege escalation vulnerability. To exploit this vulnerability, a local attacker can insert an executable file in the path of the service. Rebooting the system or restarting the service will run the malicious executable with elevated privileges.
The Lenovo ThinkVantage Communications Utility installs 2 services with unquoted service paths. This enables a local privilege escalation vulnerability. To exploit this vulnerability, a local attacker can insert an executable file in the path of either service. Rebooting the system or restarting either service will run the malicious executable with elevated privileges.
The Intel(R) PROSet/Wireless WiFi Software installs 2 services with unquoted service paths, which enables a local privilege escalation vulnerability. To exploit this vulnerability, a local attacker can insert an executable file in the path of either service. Rebooting the system or restarting either service will run the malicious executable with elevated privileges.
The Intel(R) PROSet/Wireless for Bluetooth(R) + High Speed service is installed with an unquoted service path, which enables a local privilege escalation vulnerability. To exploit this vulnerability, a local attacker can insert an executable file in the path of the service. Rebooting the system or restarting the service will run the malicious executable with elevated privileges.
StoreGrid is a re-brandable backup solution, which can install 2 services with unquoted service paths. This enables a local privilege escalation vulnerability. To exploit this vulnerability, a local attacker can insert an executable file in the path of either service. Rebooting the system or restarting the service will run the malicious executable with elevated privileges. This was tested on version 4.0, but other versions may be affected as well.
The Lenovo Slim USB Keyboard service is installed with an unquoted service path, which enables a local privilege escalation vulnerability. To exploit this vulnerability, a local attacker can insert an executable file in the path of the service. Rebooting the system or restarting the service will run the malicious executable with elevated privileges.
The Lenovo RapidBoot HDD Accelerator service is installed with an unquoted service path, which enables a local privilege escalation vulnerability. To exploit this vulnerability, a local attacker can insert an executable file in the path of the service. Rebooting the system or restarting the service will run the malicious executable with elevated privileges.
The Intel(R) Management and Security Application Local Management Service (LMS) is installed with an unquoted service path, which enables a local privilege escalation vulnerability. To exploit this vulnerability, a local attacker can insert an executable file in the path of the service. Rebooting the system or restarting the service will run the malicious executable with elevated privileges.
The exploit is a part of EAST Framework and is designed to exploit a remote overflow vulnerability in HikVision Security Systems ActiveX. The vulnerability is a 0-day and affects Windows XP and 7. The exploit is written in Python and uses a connectback port of 8089.