Agnitum Outpost Security Suite 8.1 – Local Privilege Escalation

  • 作者: Ahmad Moghimi
    日期: 2013-08-02
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/27282/
  • # Exploit Title: Agnitum Outpost security suite privilege escalation - 0Day
    # Date: 2013-08-02
    # Exploit Author: Ahmad Moghimi (http://mallocat.com
    <http://mallocat.com/>, https://twitter.com/mall0cat)
    # Vendor Homepage: http://www.agnitum.com/
    # Software Link: http://dl2.agnitum.com/OutpostSecuritySuiteProInstall.exe
    # Version: 8.1 Latest build
    # Tested on: windows
    # CVE : NO-CVE
    
    Reference: http://mallocat.com/a-journey-to-antivirus-escalation/
    Demo: http://mallocat.com/wp-content/uploads/2013/08/win7.swf
    Exploit code: http://mallocat.com/wp-content/uploads/2013/08/escalate.7z
    https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27282.7z
    
    Exploit-DB note:
    Open and read the reference supplied
    
    From low privileged account
    #1) Register Regsvr32.exe /s C:\Program Files\agnitum\Outpost Security Suite Pro\..\..\..\x.dll
    #2) Run exploit.exe