TUCoPS :: Security App Flaws :: nai04.htm

McAfee VirusScan shstat.exe bug
Vulnerability

    VirusScan

Affected

    McAfee VirusScan

Description

    Jesper M. Johansson found following.  The SHSTAT.EXE component  of
    Virus Scan that  launches when a  user logs on  attempts to access
    the  registry  with  too  high  a  permission.   It  accesses  the
    following key:

        HKEY_LOCAL_MACHINE\SOFTWARE\McAfee\VirusScan\McShield\CURRENTVERSION

    with Set Value and Create  Sub-Key permissions.  By default  under
    Windows 2000 Professional,  members of the  Users group have  only
    read permissions  on this  key.   This causes  SHSTAT.EXE to  fail
    when the user logs on and  throw up a dialog that says  "Unable to
    access local server".  If you audit failed accesses to this key in
    the registry, you get the following Security Event Log entry:

        Event Type:     Failure Audit
        Event Source:   Security
        Event Category: Object Access
        Event ID:       560
        Date:           4/14/2000
        Time:           7:46:30 AM
        User:           <DOMAIN>\<USER>
        Computer:       <COMPUTER>
        Description:
        Object Open:
                Object Server:  Security
                Object Type:    Key
                Object Name:    \REGISTRY\MACHINE\SOFTWARE\McAfee\VirusScan\McShield\CURRENTVERSION
                New Handle ID:  -
                Operation ID:   {0,972168}
                Process ID:     1168
                Primary User Name:      <USER>
                Primary Domain: <DOMAIN>
                Primary Logon ID:       (0x0,0xC2A75)
                Client User Name:       -
                Client Domain:  -
                Client Logon ID:        -
                Accesses                READ_CONTROL
                                Query key value
                                Set key value
                                Create sub-key
                                Enumerate sub-keys
                                Notify about changes to keys

                Privileges              -

    It  is  unclear  why  SHSTAT.EXE  would  need set value and create
    sub-key  permission  on  this  key.  Furthermore,  it  is   highly
    undesirable from  a security  standpoint to  allow ordinary  users
    set value permission  on this sub-key  since the key  contains the
    list of  items to  exclude from  scanning, the  list of extensions
    considered to be programs, and other sensitive information.

    Tested version  for all  this was  on 4.03a,  which apparently is,
    and is not, the most recent release that runs on NT, depending  on
    who you are.

    The subject  registry key  is in  a different  place in  VirusScan
    4.5.0.  It's in

        HKLM\Software\Network Associates\TVD\Shared Components\On Access Scanner\McShield\Configuration

    The USER rights on this key are READ ONLY - Query Value, Enumerate
    Subkeys, Notify and Read Control.   The rights for POWER USER  are
    SPECIAL  -  Query  Value,  Set  Value,  Create  Subkey,  Enumerate
    Subkeys, Notify, Delete and Read Control.  CREATOR OWNER has  FULL
    CONTROL **of subkeys only**.   ADMINISTRATOR and SYSTEM have  FULL
    CONTROL.   That's because  those rights  _under Windows  2000_ are
    inherited from  above.   From HKLM\Software  in fact.   Under NT 4
    those  permissions  are  considerably  loser  and actually include
    Create  Subkey,  Set   Value,  and  Delete,   by  default  on   NT
    Workstation.

    In 4.5 the  problem is basically  still there.   The program STILL
    tries to  access this  key with  Set Value  permission; apparently
    not  with  Create  Subkey  permission,  however.  Furthermore, the
    program actually runs  now, rather than  giving the error  message
    that you  got in  4.03a.   However, apparently  NAI still believes
    that  unprivileged  users  should  be  able  to override the virus
    scanner.

Solution

    Nothing yet.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH