CVE-2020-0728: Windows Modules Installer Service Information Disclosure Vulnerability

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



The TrustedInstaller service running on the Windows operating system
hosts a COM service called Sxs Store Class; its ISxsStore interface
provides methods to install/uninstall assemblies via application
manifests files into the WinSxS store. These API methods were meant to
be available for users with administrative privileges only, but the
logic was unintentionally exposed to anyone on the system due to
improper implementation of the authorization logic.

Source files referenced by the manifest can be abused via junction
points and thus getting the service made a copy of arbitrary files in
the context of NT_AUTHORITY\SYSTEM. Repository with proof of concept
code: https://github.com/irsl/CVE-2020-0728

The wcp framework (the codebase behind processing the manifest files)
is quite complex and features various 'installers' (e.g.
GenericCommand execution among the 'advanced' ones) - making this flaw
an attractive attack surface for privilege escalation - , but the
interface accessible above seems to be limited to only the 'primitive
installers'.

Microsoft's patch was released 02/11/2020; the official advisory can
be found here: https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0728



[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux