Zillya Total Security 3.0.2367.0 – Local Privilege Escalation
Zillya's processes run in SYSTEM privileges. The user with low privileges in the system can copy any file they want to any location by using the quarantine module in Zillya. This is an example of AVGater vulnerabilities that are often found in antivirus programs. Attackers create new folder and into malicious file. It can be a DLL or any file. Attacker waits for 'Zillya Total Security' or 'Zillya Internet Security' to quarantine him. The created folder is linked with the Google Symbolic Link Tools 'Create Mount Point' tools to the folder that the current user does not have write permission to. Restores the quarantined file. When checked, it is seen that the file has been moved to an unauthorized location. This is evidence of escalation vulnerability. An attacker with an unauthorized user can write to directories that require authorization. Using techniques such as DLL hijacking, it can gain access to SYSTEM privileges.