Huawei Technologies eSpace Meeting Service Local Privilege Escalation Vendor: Huawei Technologies Co., Ltd. Product web page: Affected version: (V100R001C03SPC201B050) Summary: Huawei's eSpace Meeting solution fully meets the needs of enterprise customers for an integrated daily collaboration system by integrating the conference server, conference video terminal, conference user authorization, and teleconference. Desc: The application is vulnerable to an elevation of privileges vulnerability which can be used by a simple user that can change the executable file with a binary of choice. The vulnerability exist due to the improper permissions, with the 'F' flag (full) for the 'Users' group, for the 'eMservice.exe' binary file. The service is installed by default to start on system boot with LocalSystem privileges. Attackers can replace the binary with their rootkit, and on reboot they get SYSTEM privileges. Tested on: Microsoft Windows 7 Professional SP1 (EN) Vulnerbility discovered by Gjoko 'LiquidWorm' Krstic @zeroscience Advisory ID: ZSL-2014-5171 Advisory URL: Huawei ID: Huawei-SA-20140310-01 Huawei Advisory: 18.01.2014 ------------------------------------ C:\>sc qc eSpaceMeeting [SC] QueryServiceConfig SUCCESS SERVICE_NAME: eSpaceMeeting TYPE : 110 WIN32_OWN_PROCESS (interactive) START_TYPE : 2 AUTO_START ERROR_CONTROL : 1 NORMAL BINARY_PATH_NAME : C:\ProgramData\eSpaceMeeting\eMservice.exe LOAD_ORDER_GROUP : TAG : 0 DISPLAY_NAME : eSpaceMeeting DEPENDENCIES : SERVICE_START_NAME : LocalSystem C:\>icacls ProgramData\eSpaceMeeting\eMservice.exe ProgramData\eSpaceMeeting\eMservice.exe BUILTIN\Users:(I)(F) NT AUTHORITY\SYSTEM:(I)(F) BUILTIN\Administrators:(I)(F) Successfully processed 1 files; Failed processing 0 files C:\> ------------------------------------ # Iranian Exploit DataBase = http://IeDb.Ir [2014-03-11]