Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Security)  >   NOD32 Vendors:   Eset
NOD32 Quarantine Function Lets Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1015867
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Apr 5 2006
Impact:   Modification of system information, Modification of user information, Root access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Prior to 2.51.26
Description:   A vulnerability was reported in NOD32. A local user can gain elevated privileges.

A local user can invoke the 'quarantine a file' option to copy an arbitrary file to the quarantine directory. Then, the local user can invoke the 'restore to...' option to cause the file to be written with System level privileges. Files can be created but cannnot be overwritten.

The vendor was notified on March 24, 2006.

A demonstration exploit is available at:

Bipin Gautam discovered this vulnerability.

Impact:   A local user can gain System level privileges on the target system.
Solution:   The vendor has issued a fixed version (2.51.26).
Vendor URL: (Links to External Site)
Cause:   Access control error
Underlying OS:  Windows (Any)

Message History:   None.

 Source Message Contents

Subject:  NOD32 local privilege escalation vulnerability

NOD32 local privilege escalation vulnerability

Not affected: > Version 2.51.26
Tested on: Winxp sp2
Risk: Average

To escalate the system privilage, the option 'quarentine a file' in NOD32 can be exploited & a malicious file can be copied to the
 quarentine and using the 'restore to...' option it can be  dropped to the directory in which the STSTEM user just had read-only permession.

Note: from lower privilege, this trick can write a file to any directory in which the user has read-only access to but can't overwrite
 a file if the file-name already exists.

Vendor Website:
Vender reported: Mar 24, 2006
Patch release: Apr 4, 2006 (Version 2.51.26)

POC video & detail description:


Bipin Gautam


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC