Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

- michael dell photo dell - Give-me-admin security gremlin found lurking in bundled support tool –

Credits: The Register

Dell’s troubleshooting software SupportAssist, bundled with the US tech titan’s home and business computers, has a security flaw that can be exploited by and rogue logged-in users to gain administrator powers.

The Texan system slinger today issued an advisory warning that its repair tool suffers a privilege-escalation , CVE-2019-12280, and needs patching. We’re told Dell SupportAssist for Business PCs version 2.0.1 and Dell SupportAssist for Home PCs version 3.2.2 are the builds you need to fetch and install to kill off this high-severity hole.

Affected versions of the software include Dell SupportAssist for Business PCs version 2.0, and Dell SupportAssist for Home PCs version 3.2.1 and all prior releases.

The IT giant includes the -based troubleshooting program with new desktops, notebooks, and tablets. Unfortunately, as eggheads at SafeBreach Labs discovered and privately reported, the software insecurely loads .dll files when run. Researcher Peleg Hadar told The Register SupportAssist, which runs with SYSTEM-level privileges, will automatically pull in unsigned code libraries from user-controlled folders. That means malware or dodgy users can leave their own .dll files in a , wait for SupportAssist to blindly load them, and thus execute code within an admin context.

That would allow software nasties already on a computer, or a rogue logged-in insider, to gain complete control over a vulnerable box. It also means, say, browser that can drop files arbitrarily in user-writable directories can potentially trigger a remote admin-level compromise. This .dll injection vulnerability is present on as many as an estimated 0 million Dell PCs.

“We can assume that all Dell PCs that run the Windows operating system without changes from the manufacturer are vulnerable, as long as the user didn’t update,” said Hadar.

The most concerning part of this story is that Hadar believes Dell is not alone in shipping PCs with this particular flaw.

The reason for this is Dell doesn’t actually make SupportAssist. The software itself is written and maintained by PC Doctor, a support and diagnostics software specialist that sells its code to PC makers that then rebrand the tools and bundle them into their own computer products.

“Once we found and reported it to Dell, they reported it to PC Doctor,” explained Hadar. “They said there are several OEMs that are affected by this.”

Indeed, Dell’s brief advisory, which contains instructions on how to patch, noted: “Dell SupportAssist for Business PCs and Dell SupportAssist for Home PCs require an update to the latest versions to address a security vulnerability within the PC Doctor component.”

Unfortunately, SafeBreach did not hear from PC Doctor to confirm the extent of the fallout of this programming blunder, and El Reg was unable to get in touch with the developer by the time of publication.

Should the vulnerable software prove to have been distributed by other computer vendors, it is likely we will see several big names in the PC space issuing updates similar to Dell’s, and PC Doctor will have some explaining to do to its partners and the general public.

- logo16 - Give-me-admin security gremlin found lurking in bundled support tool –

www.extremehacking.org

Sadik Shaikh | Cyber Suraksha Abhiyan, Ethical Hacking Training Institute, CEHv10,CHFI,ECSAv10,CAST,ENSA, CCNA, CCNA SECURITY,MCITP,RHCE,CHECKPOINT, ASA FIREWALL,VMWARE,CLOUD,ANDROID,IPHONE,NETWORKING HARDWARE,TRAINING INSTITUTE IN PUNE, Certified Ethical Hacking,Center For Advanced Security Training in India, ceh v10 course in Pune-India, ceh certification in pune-India, ceh v10 training in Pune-India, Ethical Hacking Course in Pune-India



Source link

No tags for this post.

LEAVE A REPLY

Please enter your comment!
Please enter your name here