SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   Apcupsd Vendors:   Apcupsd Project
Apcupsd 'apcupsd.exe' Permissions Let Local Users Obtain System Privileges
SecurityTracker Alert ID:  1038707
SecurityTracker URL:  http://securitytracker.com/id/1038707
CVE Reference:   CVE-2017-7884   (Links to External Site)
Date:  Jun 16 2017
Impact:   Execution of arbitrary code via local system, Root access via local system
Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 3.14.14 and prior
Description:   A vulnerability was reported in Apcupsd. A local user can gain system privileges on the target system.

A local user can replace the 'C:\apcupsd\bin\apcupsd.exe' executable with an arbitrary file to cause the system to execute arbitrary code with system level privileges at startup.

The vendor was notified on April 17, 2017.

fragsh3ll aka Richard Young reported this vulnerability.

Impact:   A local user can obtain system privileges on the target system.
Solution:   No solution was available at the time of this entry.
Vendor URL:  www.apcupsd.com/ (Links to External Site)
Cause:   Access control error
Underlying OS:  Windows (Any)

Message History:   None.


 Source Message Contents

Date:  Thu, 15 Jun 2017 09:57:15 -0400
Subject:  [FD] APC UPS Daemon <= 3.14.14 Local Privilege Escalation

WytdIENyZWRpdHM6IGZyYWdzaDNsbCBha2EgUmljaGFyZCBZb3VuZwpbK10gQ29udGFjdDogaHR0
cHM6Ly90d2l0dGVyLmNvbS9mcmFnc2gzbGwKCgpWZW5kb3IKPT09PT09PT09PQpodHRwOi8vd3d3
LmFwY3Vwc2Qub3JnCgoKUHJvZHVjdAo9PT09PT09PT09PQpBUEMgVVBTIERhZW1vbiA8PSAzLjE0
LjE0CgoKVnVsbmVyYWJpbGl0eSBUeXBlCj09PT09PT09PT09PT09PT09PT09PQpQcml2aWxlZ2Ug
RXNjYWxhdGlvbgoKClZlbmRvciBEZXNjcmlwdGlvbgo9PT09PT09PT09PT09PT09PT09PT0KQXBj
dXBzZCBjYW4gYmUgdXNlZCBmb3IgcG93ZXIgbWFuZ2VtZW50IGFuZCBjb250cm9sbGluZyBtb3N0
IG9mIEFQQ+KAmXMgVVBTCm1vZGVscyBvbiBVbml4IGFuZCBXaW5kb3dzIG1hY2hpbmVzLiBBcGN1
cHNkIHdvcmtzIHdpdGggbW9zdCBvZiBBUEPigJlzClNtYXJ0LVVQUyBtb2RlbHMgYXMgd2VsbCBh
cyBtb3N0IHNpbXBsZSBzaWduYWxsaW5nIG1vZGVscyBzdWNoIGEgQmFjay1VUFMsCmFuZCBCYWNr
VVBTLU9mZmljZS4gRHVyaW5nIGEgcG93ZXIgZmFpbHVyZSwgYXBjdXBzZCB3aWxsIGluZm9ybSB0
aGUgdXNlcnMKYWJvdXQgdGhlIHBvd2VyIGZhaWx1cmUgYW5kIHRoYXQgYSBzaHV0ZG93biBtYXkg
b2NjdXIuIElmIHBvd2VyIGlzIG5vdApyZXN0b3JlZCwgYSBzeXN0ZW0gc2h1dGRvd24gd2lsbCBm
b2xsb3cgd2hlbiB0aGUgYmF0dGVyeSBpcyBleGhhdXN0ZWQsIGEKdGltZW91dCAoc2Vjb25kcykg
ZXhwaXJlcywgb3IgcnVudGltZSBleHBpcmVzIGJhc2VkIG9uIGludGVybmFsIEFQQwpjYWxjdWxh
dGlvbnMgZGV0ZXJtaW5lZCBieSBwb3dlciBjb25zdW1wdGlvbiByYXRlcy4gQXBjdXBzZCBpcyBs
aWNlbnNlZAp1bmRlciB0aGUgR1BMIHZlcnNpb24gMi4KCgpDVkUgUmVmZXJlbmNlCj09PT09PT09
PT09PT09PQpDVkUtMjAxNy03ODg0CgoKVnVsbmVyYWJpbGl0eSBEZXRhaWxzCj09PT09PT09PT09
PT09PT09PT09PT09PQpUaGUgZGVmYXVsdCBpbnN0YWxsYXRpb24gb2YgQVBDVVBTRCBhbGxvd3Mg
YSBsb2NhbCB1bnByaXZpbGVnZWQgdXNlciB0byBydW4KYXJiaXRyYXJ5IGNvZGUgd2l0aCBlbGV2
YXRlZCBwcml2aWxlZ2VzIGJ5IHJlcGxhY2luZyB0aGUgc2VydmljZSBleGVjdXRhYmxlCmFwY3Vw
c2QuZXhlIHdpdGggYSBtYWxpY2lvdXMgZXhlY3V0YWJsZSwgd2hpY2ggd2lsbCBydW4gd2l0aCBT
WVNURU0KcHJpdmlsZWdlcyBhdCBzdGFydHVwLgoKCkM6XGFwY3Vwc2RcYmluXGFwY3Vwc2QuZXhl
CiAgUlcgQlVJTFRJTlxBZG1pbmlzdHJhdG9ycwogIFJXIE5UIEFVVEhPUklUWVxTWVNURU0KICBS
VyBOVCBBVVRIT1JJVFlcQXV0aGVudGljYXRlZCBVc2VycwoKCgpFeHBsb2l0Cj09PT09PT09PT0K
MSkgSW5zdGFsbCB0aGUgYXBwbGljYXRpb24gd2l0aCBkZWZhdWx0IHNldHRpbmdzLgoKMikgUmVw
bGFjZSB0aGUgc2VydmljZSBleGVjdXRhYmxlIGxvY2F0ZWQgYXQgQzpcYXBjdXBzZFxiaW5cYXBj
dXBzZC5leGUKd2l0aCBhbiBleGVjdXRhYmxlIG9mIHlvdXIgY2hvaWNlLgoKMykgUmVzdGFydCB0
aGUgc2VydmljZSBvciBjb21wdXRlciwgdGhlIGV4ZWN1dGFibGUgd2lsbCBydW4uCgoKCkRpc2Ns
b3N1cmUgVGltZWxpbmU6Cj09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT0KNC8x
Ny8xNyAtIFZlbmRvciBub3RpZmllZAo0LzE3LzE3IC0gVmVuZG9yIGFja25vd2xlZGdlZAo1LzYv
MTcgLSBWZW5kb3Igc3RpbGwgd29ya2luZwo2LzUvMTcgLSBObyByZXNwb25zZQo2LzE0LzE3IC0g
Tm8gcmVzcG9uc2UKNi8xNS8xNyAtIFB1YmxpYyBkaXNjbG9zdXJlCgpfX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXwpTZW50IHRocm91Z2ggdGhlIEZ1bGwgRGlz
Y2xvc3VyZSBtYWlsaW5nIGxpc3QKaHR0cHM6Ly9ubWFwLm9yZy9tYWlsbWFuL2xpc3RpbmZvL2Z1
bGxkaXNjbG9zdXJlCldlYiBBcmNoaXZlcyAmIFJTUzogaHR0cDovL3NlY2xpc3RzLm9yZy9mdWxs
ZGlzY2xvc3VyZS8=
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2017, SecurityGlobal.net LLC