Exploit Agnitum Outpost Security Suite 8.1 - Local Privilege Escalation

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
27282
Проверка EDB
  1. Пройдено
Автор
AHMAD MOGHIMI
Тип уязвимости
LOCAL
Платформа
WINDOWS
CVE
null
Дата публикации
2013-08-02
Код:
# Exploit Title: Agnitum Outpost security suite privilege escalation - 0Day
# Date: 2013-08-02
# Exploit Author: Ahmad Moghimi (http://mallocat.com
<http://mallocat.com/>, https://twitter.com/mall0cat)
# Vendor Homepage: http://www.agnitum.com/
# Software Link: http://dl2.agnitum.com/OutpostSecuritySuiteProInstall.exe
# Version: 8.1 Latest build
# Tested on: windows
# CVE : NO-CVE

Reference: http://mallocat.com/a-journey-to-antivirus-escalation/
Demo: http://mallocat.com/wp-content/uploads/2013/08/win7.swf
Exploit code: http://mallocat.com/wp-content/uploads/2013/08/escalate.7z
              https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27282.7z

Exploit-DB note:
Open and read the reference supplied

From low privileged account
#1) Register Regsvr32.exe /s C:\Program Files\agnitum\Outpost Security Suite Pro\..\..\..\x.dll
#2) Run exploit.exe
 
Источник
www.exploit-db.com

Похожие темы