exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

F-Secure AV Man-In-The-Middle

F-Secure AV Man-In-The-Middle
Posted Mar 10, 2017
Authored by Martin Kolarik

F-Secure AV suffers from an issue where remote code execution under SYSTEM can take place due to a man-in-the-middle vulnerability.

tags | advisory, remote, code execution
advisories | CVE-2016-9892
SHA-256 | c573c0561d7186ee1f6213ffb825479e8678f2c6a81ffc7ed854bfd47db8d5f9

F-Secure AV Man-In-The-Middle

Change Mirror Download
CVE-2017-6466 - Remote Code Execution under SYSTEM via MITM in F-Secure AV
--------------------------------------------------------------------------

Summary
-------
Title: Remote Code Execution under SYSTEM via MITM in F-Secure AV
CVE: CVE-2016-9892
Vendor: F-Secure
Product: All products that include the software updater component
(https://www.f-secure.com/en/web/business_global/software-updater)
Publication Date: 2017-03-08
Fix: Not available - the vendor does not see this as a security problem
Discoverer: Martin Kolarik (@MaKolarik)

Description
-----------
Software Updater is a component used to download and install updates for
operating system and many 3rd party software products (a complete list can
be
found at
https://www.f-secure.com/documents/10192/406869/Software+Updater+-+Supported
+Products).
It downloads installation packages over HTTP protocol, with little or no
verification after downloading, and subsequently executes them under SYSTEM
account. This allows a remote attacker who can modify the packages during
downloading to gain a complete control of a target system.

Technical details
-----------------
Software Updater can be configured in two ways:
a) Manual installation (default). System administrator logged into
F-Secure Policy Manager Console can inspect a list of all available
updates for managed computers, and select which updates will be
installed. In this case, there is absolutely no verification after
downloading and packages can be replaced with any executable.

b) Automatic installation. Updates are downloaded and installed
automatically when they become available. In this case, an option to
only install signed packages is on by default. If this option is on,
packages without signature are not installed automatically; instead,
the installation command has to be issued manually from the Policy
Manager Console (as if auto-updates were not enabled at all). Since
not all vendors sign their packages, it is also possible to turn
this verification off via Policy Manager Console.

Even allowing only signed packages does not provide almost any
protection, because the only thing Software Updater checks is if the
package has a signature. It does not check by whom it was signed, nor
when it was signed, so it is possible to replace it with any other
executable, as long as it is also signed. In case the attacker is not
able to sign their own code directly, they can use this vulnerability
to install any publicly available software signed by its vendor, and
subsequently exploit a vulnerability in that software instead.
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close