[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[FD] WindScribe VPN 1.81 Privilege Escalation
- To: fulldisclosure@xxxxxxxxxxxx
- Subject: [FD] WindScribe VPN 1.81 Privilege Escalation
- From: Emin Ghuliev <drmint80@xxxxxxxxx>
- Date: Fri, 25 May 2018 00:41:34 +0400
Vulnerability Details:
WindScribe VPN uses OpenVPN client for connections. Also it creates a
system process named WindScribeService.exe
This process (WindScribeService.exe) establishes a NamedPipe endpoint that
allows WindScribe VPN process to connect and execute OpenVPN process or
other processes (like taskill etc.). Attacker can run any malicious process
in system privilege through this NamedPipe.
Also I've write about it here:
http://sqlulz.blogspot.com/2018/05/windscribe-vpn-privilege-escalation.html
Emin Ghuliev - drmint80
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/