[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    [FD] WindScribe VPN 1.81 Privilege Escalation
From:       Emin Ghuliev <drmint80 () gmail ! com>
Date:       2018-05-24 20:41:34
Message-ID: CAOeVr7o-Ak9szDzaj-C2RN2jVHdLzHwDvQQJ4R9uE6cxEkHG+Q () mail ! gmail ! com
[Download RAW message or body]

Vulnerability Details:

WindScribe VPN uses OpenVPN client for connections. Also it creates a
system process named WindScribeService.exe
This process (WindScribeService.exe) establishes a NamedPipe endpoint that
allows WindScribe VPN process to connect and execute OpenVPN process or
other processes (like taskill etc.). Attacker can run any malicious process
in system privilege through this NamedPipe.


Also I've write about it here:
http://sqlulz.blogspot.com/2018/05/windscribe-vpn-privilege-escalation.html



Emin Ghuliev - drmint80

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic