|
Vulnerability VirusScan 4.03a Affected Network Associates VirusScan 4.03a for NT, 2000 Description Following is based on a EBE Security Advisory by Kevin Beaumont. It is Registry permissions checking issue; LOCAL and REMOTE (see below) comprise of system security, via any user with either 'User' or 'Power User' authentication on any workstation which is running VirusScan. The 'Network Associates Task Scheduler Service', which runs as SYSTEM, has a feature which allows a program to be scheduled to run after a successful DAT update. The program called is also passed full SYSTEM privileges. To edit the program called, you can bring up the VirusScan Console by right clicking on the VirusScan icon in your task bar, and selecting 'Console'. Now right click on 'Automatic DAT Update' and select 'Properties'. Then choose 'Advanced'. Attempting to set this value as a local user (either in the 'User' or 'Power User' group) via the VirusScan console fails - both the tick box to enable the feature and text box used to enter the program name are 'greyed out'. However, under the default installation options of VirusScan, the registry key has full control to All authenicated users. The registry key in question is: HKEY_LOCAL_MACHINE\SOFTWARE\McAfee\VirusScan\Tasks\Update The keys in question are: bExecAfterUpdate = dword:00000000 szUpdateShellScript = "" There is an additional key which can be used to cause the program to be called even if the DAT update fails: bRetrieveOnly = dword:00000000 All users have permissions to alter the actual scheduling of the update itself via the VirusScan Console. Numerous attack methods are available. Here are a few examples tested: 1) Save the following text as a file called 'userman.reg'. Open the file so the entries are entered into the registry. Open the VirusScan Console, and change the schedule of the Automatic DAT update so it runs within the next few minutes. Then sit and wait for User Manager to kick in. Then add your login ID into the local administrator group... [HKEY_LOCAL_MACHINE\SOFTWARE\McAfee\VirusScan\Tasks\Update] "szUpdateShellScript"="c:\winnt\system32\musrmgr.exe" "bRetrieveOnly"=dword:00000001 "bExecAfterUpdate"=dword:00000001 "bSchedEnabled"=dword:00000001 "bLogToFile"=dword:00000000 2) Use regedt32.exe to remotely connect to other PCs in your organisation. Set the above registry keys. Select a program to run (eg "\\file_server_1\share\trojanhorse.exe") and then wait for the Automatic DAT update to kick in. The program will run transparently to the user. Solution Use regedt32.exe to change permissions on HKEY_LOCAL_MACHINE\SOFTWARE\McAfee\VirusScan\Tasks and its subkeys. All users should be READ access. Administrators and SYSTEM should have full control. Under Microsoft Windows 2000 Professional test system, authors found that 'Standard Users' did NOT have permissions to write/modify these registry keys. However, 'Power Users' do have permissions to modify them. If you work in a company that uses Windows 2000 and standard users are given 'Power User' permissions, you are affected.