Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Security)  >   eScan Vendors:   MicroWorld Technologies
eScan Lack of Authentication Lets Local Users Execute Arbitrary Commands With System Privileges
SecurityTracker Alert ID:  1018007
SecurityTracker URL:
CVE Reference:   CVE-2007-0655   (Links to External Site)
Date:  May 7 2007
Impact:   Root access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 8.0.671.1
Description:   A vulnerability was reported in eScan. A local user can gain System privileges on the target system.

A local user can send SCASYS, SCADRV, or SCAMEM commands to the MicroWorld Agent service (MWAGENT.EXE) on TCP port 2222 to execute arbitrary commands on the target system. The commands will run with the privileges of the target service (System privileges).

A local user can invoke the DISMON and ENAMON commands to disable the eScan Anti-Virus Monitor.

A local user can invoke the UNISOFT command to uninstall the product.

A local user can invoke the SEND command to view the contents of arbitrary files on the target system.

Other commands can also be exploited.

The vendor was notified on February 13, 2007.

Carsten Eiram of Secunia Research discovered this vulnerability.

The original advisory is available at:

Impact:   A local user can execute arbitrary commands on the target system with System level privileges.
Solution:   The vendor has issued a fix (Beta3).
Vendor URL: (Links to External Site)
Cause:   Access control error
Underlying OS:  Windows (Any)

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC