Bugtraq mailing list archives

KillProcess 2.20 and priors "FileDescription" Local Buffer Overflow Issue


From: fRoGGz () securityfocus com
Date: 9 Sep 2005 16:11:10 -0000



VULNERABLE PRODUCT
------------------
Software: KillProcess
Platforms: Windows
Version: 2.20 and priors
Original advisorie: http://sbox.nightmail.ru
--------------------------


BACKGROUND
----------
This funny application can terminate any Windows process with the click of a button. 
It can also prevent unwanted processes from ever executing by scanning the active 
process list for unwanted processes and terminating them on sight.
Source: http://orangelampsoftware.com


DESCRIPTION
-------------
A malicious .exe file with a long FileDescription in version resource can generate
a local exploitation of a buffer overflow and allows attackers to execute arbitrary code.


PROOF OF CONCEPT
----------------
I've code a 2,78 Ko PoC.
FileDescription have been set to A x 544 bytes.
PoC is available here: http://sbox.nightmail.ru/KillProc_PoC.exe

There is another little bug, but not really dangerous.
If you add an application to killlist, then lunch it. Ok, boom ...
But if you start XX same process at the same time, all applications will not be killed.


ANALYSIS
--------
Exploitation of the described vulnerability allows attackers to
execute arbitrary code under the context of the user who started Process Explorer.
Exploitation requires that an attacker convince a target user to view properties of
malicious executable file with a vulnerable version of Process Explorer.


VENDOR STATUS
-------------
Vendor have been contacted.


Thanks
------
Greet's fly out to ATmaCA. This idea was first credit by Kozan.
It was on Jul 20 2005, for another software, so thanks to him ;)


CREDiTS
----------------------
SecuBox Labs - fRoGGz
web: secubox.teria.org
--------------------------


Current thread: