The vulnerable system is bound to the network stack and the set of possible attackers extends beyond the other options listed below, up to and including the entire Internet. Such a vulnerability is often termed “remotely exploitable” and can be thought of as an attack being exploitable at the protocol level one or more network hops away (e.g., across one or more routers). An example of a network attack is an attacker causing a denial of service by sending a specially crafted TCP packet across a wide area network (e.g., CVE-2004-0230).
Attack Complexity
High
AC
The successful attack depends on the evasion or circumvention of security-enhancing techniques in place that would otherwise hinder the attack. These include: Evasion of exploit mitigation techniques. The attacker must have additional methods available to bypass security measures in place. For example, circumvention of address space randomization (ASLR) or data execution prevention must be performed for the attack to be successful. Obtaining target-specific secrets. The attacker must gather some target-specific secret before the attack can be successful. A secret is any piece of information that cannot be obtained through any amount of reconnaissance. To obtain the secret the attacker must perform additional attacks or break otherwise secure measures (e.g. knowledge of a secret key may be needed to break a crypto channel). This operation must be performed for each attacked target.
Privileges Required
None
PR
The attacker is unauthenticated prior to attack, and therefore does not require any access to settings or files of the vulnerable system to carry out an attack.
User Interaction
None
UI
The vulnerable system can be exploited without interaction from any human user, other than the attacker. Examples include: a remote attacker is able to send packets to a target system a locally authenticated attacker executes code to elevate privileges
Scope
Unchanged
S
An exploited vulnerability can only affect resources managed by the same security authority. In the case of a vulnerability in a virtualized environment, an exploited vulnerability in one guest instance would not affect neighboring guest instances.
Confidentiality
None
C
There is no impact on the confidentiality of the system; the attacker does not gain the ability to read any data.
Integrity
High
I
There is a total compromise of system integrity. There is a complete loss of system protection, resulting in the attacker being able to modify any file on the target system.
Availability
None
A
There is no impact on the availability of the system; the attacker does not have the ability to disrupt access to or use of the system.
Below is a copy: Email-Worm.Win32.Pluto.b / Insecure Permissions
Discovery / credits: Malvuln - malvuln.com (c) 2022
Original source: https://malvuln.com/advisory/60a7d5e2d446110d84ef65f6a37af0eb.txt
Contact: [email protected]
Media: twitter.com/malvuln
Threat: Email-Worm.Win32.Pluto.b
Vulnerability: Insecure Permissions
Description: The malware writes a dir and PE files with insecure permissions to c drive granting change (C) permissions to the authenticated user group. Standard users can rename the executable dropped by the malware to disable it or replace it with their own executable. Then wait for a privileged user to logon to the infected machine to potentially escalate privileges.
Family: Pluto
Type: PE32
MD5: 60a7d5e2d446110d84ef65f6a37af0eb
Vuln ID: MVID-2022-0547
Disclosure: 04/14/2022
Exploit/PoC:
C:\>cacls "My Downloads"
C:\My Downloads BUILTIN\Administrators:(OI)(CI)(ID)F
NT AUTHORITY\SYSTEM:(OI)(CI)(ID)F
BUILTIN\Users:(OI)(CI)(ID)R
NT AUTHORITY\Authenticated Users:(ID)C
NT AUTHORITY\Authenticated Users:(OI)(CI)(IO)(ID)C
C:\>dir "My Downloads"
Volume in drive C has no label.
Directory of C:\My Downloads
02/18/2013 04:39 PM 34,816 Age Of Empires 2 Key Generator.exe
02/18/2013 04:39 PM 34,816 AikaQuest3Hentai Key Generator.exe
02/18/2013 04:39 PM 34,816 AIM Account Stealer ISO - Full Downloader.exe
02/18/2013 04:39 PM 34,816 Battle.net Crack.exe
02/18/2013 04:39 PM 34,816 Black And White ISO - Full Downloader.exe
02/18/2013 04:39 PM 34,816 Civilization 3 Crack.exe
02/18/2013 04:39 PM 34,816 Civilization 3 Full Downloader.exe
02/18/2013 04:39 PM 34,816 Comanche 4 Full Downloader.exe
02/18/2013 04:39 PM 34,816 Comanche 4 ISO - Full Downloader.exe
02/18/2013 04:39 PM 34,816 Combat Flight Simulator 3 Full Downloader.exe
02/18/2013 04:39 PM 34,816 Critical Point Manga game Full Downloader.exe
02/18/2013 04:39 PM 34,816 Critical Point Manga game Patch.exe
02/18/2013 04:39 PM 34,816 Dark Age Of Camelot Shrouded Isles Crack.exe
02/18/2013 04:39 PM 34,816 Dark Age Of Camelot Shrouded Isles Patch.exe
02/18/2013 04:39 PM 34,816 Deadly Dozen Key Generator.exe
02/18/2013 04:39 PM 34,816 Emperor Rise Of the Middle Kingdom Full Downloader.exe
02/18/2013 04:39 PM 34,816 Empire Earth ISO - Full Downloader.exe
02/18/2013 04:39 PM 34,816 F1 Grand Pix 4 Patch.exe
02/18/2013 04:39 PM 34,816 Free Virus Removal Tool From Symantec Full Downloader.exe
02/18/2013 04:39 PM 34,816 Gladiator Full Downloader.exe
02/18/2013 04:39 PM 34,816 Gladiator ISO - Full Downloader.exe
02/18/2013 04:39 PM 34,816 Grand Prix 4 ISO - Full Downloader.exe
02/18/2013 04:39 PM 34,816 Grand Theft Auto 3 Key Generator.exe
02/18/2013 04:39 PM 34,816 GTA3 ISO - Full Downloader.exe
02/18/2013 04:39 PM 34,816 Half Life Blue Shift ISO - Full Downloader.exe
02/18/2013 04:39 PM 34,816 Hard Truck 18 Wheels of Steel Crack.exe
02/18/2013 04:39 PM 34,816 Industry Giant 2 Crack.exe
02/18/2013 04:39 PM 34,816 International Cricket Captain 2003 Full Downloader.exe
02/18/2013 04:39 PM 34,816 KaZaA Spyware Remover Crack.exe
02/18/2013 04:39 PM 34,816 Macromedia Flash 5.0 Patch.exe
02/18/2013 04:39 PM 34,816 Microsoft Office XP (English) Key Generator.exe
02/18/2013 04:39 PM 34,816 MoviezChannelsInstaler ISO - Full Downloader.exe
02/18/2013 04:39 PM 34,816 MS Train Simulator Crack.exe
02/18/2013 04:39 PM 34,816 Prisoner Of War ISO - Full Downloader.exe
02/18/2013 04:39 PM 34,816 Prisoner Of War Patch.exe
02/18/2013 04:39 PM 34,816 Quake 4 BETA ISO - Full Downloader.exe
02/18/2013 04:39 PM 34,816 SIMS Full Downloader.exe
02/18/2013 04:39 PM 34,816 SIMS ISO - Full Downloader.exe
02/18/2013 04:39 PM 34,816 Soldiers Of Anarchy ISO - Full Downloader.exe
02/18/2013 04:39 PM 34,816 Star Wars II Movie Key Generator.exe
02/18/2013 04:39 PM 34,816 Strike Fighter Project 1 Patch.exe
02/18/2013 04:39 PM 34,816 Stronghold Crusader Crack.exe
02/18/2013 04:39 PM 34,816 Sudden Strike 2 Key Generator.exe
02/18/2013 04:39 PM 34,816 The Thing Full Downloader.exe
02/18/2013 04:39 PM 34,816 The Thing Key Generator.exe
02/18/2013 04:39 PM 34,816 Tomb Raider 3 Full Downloader.exe
02/18/2013 04:39 PM 34,816 Warcraft 3 ONLINE Crack.exe
02/18/2013 04:39 PM 34,816 Windows XP Full Downloader.exe
02/18/2013 04:39 PM 34,816 Windows XP ISO - Full Downloader.exe
02/18/2013 04:39 PM 34,816 Zidane-ScreenInstaler Crack.exe
50 File(s) 1,740,800 bytes
Disclaimer: The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. Do not attempt to download Malware samples. The author of this website takes no responsibility for any kind of damages occurring from improper Malware handling or the downloading of ANY Malware mentioned on this website or elsewhere. All content Copyright (c) Malvuln.com (TM).
This information is provided for TESTING and LEGAL RESEARCH purposes only. All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum