Americas

  • United States

Asia

Oceania

roger_grimes
Columnist

New Microsoft Local Privilege Escalation

Analysis
Feb 13, 20061 min
Data and Information SecuritySecurity

But new exploit code hosted on www.frsirt.com (http://www.frsirt.com/exploits/20060202.SrvCheck2.c.php) says there are several default Windows services that are vulnerable and allow privilege escalation if you have regular user credentials. The affected services are: * Service: UpnpHost ( Local Service ) * Service: SSDPSRV (Local Service) This is related to Microsoft's announcement (http://www.microsoft.com/tech

But new exploit code hosted on www.frsirt.com (http://www.frsirt.com/exploits/20060202.SrvCheck2.c.php) says there are several default Windows services that are vulnerable and allow privilege escalation if you have regular user credentials. The affected services are:

* Service: UpnpHost ( Local Service )

* Service: SSDPSRV (Local Service)

This is related to Microsoft’s announcement (http://www.microsoft.com/technet/security/advisory/914457.mspx), although there may be a slight disagreement between whether only third party services are affected.

I haven’t tested the exploit code yet, but I will and update this thread.

roger_grimes
Columnist

Roger A. Grimes is a contributing editor. Roger holds more than 40 computer certifications and has authored ten books on computer security. He has been fighting malware and malicious hackers since 1987, beginning with disassembling early DOS viruses. He specializes in protecting host computers from hackers and malware, and consults to companies from the Fortune 100 to small businesses. A frequent industry speaker and educator, Roger currently works for KnowBe4 as the Data-Driven Defense Evangelist and is the author of Cryptography Apocalypse.

More from this author