The privilege escalation vulnerability | xxxThe privilege escalation vulnerability – xxx
菜单

The privilege escalation vulnerability

八月 8, 2019 - BleepingComputer

The privilege escalation vulnerability

The popular Steam game client for Windows has a zero-day privilege escalation vulnerability that can allow an attacker with limited permissions to run a program as an administrator

Privilege escalation vulnerabilities are bugs that enable a user with limited rights to launch an executable with elevated, or administrative privileges. As Steam has over 100 million registered users and millions of them playing at a time, this is a serious risk that could be abused by malware to perform a variety of unwanted activities.

The privilege escalation vulnerability

The privilege escalation vulnerability

Two researchers publicly disclosed a zero-day vulnerability for the Steam client after Valve determined that the flaw was “Not Applicable.” The company chose not award a bug bounty or give an indication that they would fix it, and told the researchers that they were not allowed to disclose it.

In a report published yesterday, security researcher Felix was analyzing a Windows service associated with the Steam called “Steam Client Service” that launched its executable with SYSTEM privileges on Windows. The researcher also noticed that the service could be started and stopped by the “User” group, which is pretty much anyone logged on the computer.

The registry key for this service, though, was not writable by the “User” group, so it could not be modified to launch a different executable and elevate its privileges to an administrator.

The researcher did find something strange, though. When the service was started and stopped, it gave full write access to the subkeys under the HKLM/Software/Wow6432Node/Valve/Steam/Apps Registry key.

“I created test key HKLM/Software/Wow6432Node/Valve/Steam/Apps/test and restarted the service (Procmon’s log is above) and checked registry key permissions. Here I found that HKLM/SOFTWARE/Wow6432Node/Valve/Steam has explicit “Full control” for “Users” group, and these permissions inherit for all subkeys and their subkeys. I assumed that RegSetKeySecurity sets same rights, and something interesting would happen if there were a symlink. I created a link from HKLM/SOFTWARE/Wow6432Node/Valve/Steam/Apps/test to HKLM/SOFTWARE/test2 and restarted the service.”

The researcher then tried configuring a symlink from one of these subkeys to another key for which he did not ahve sufficient permissions and saw that it was possible to modify that key as well.

With this knowledge in hand, the researcher realized that any Registry key could be modified by creating a symlink to it from a subkey under HKLM/Software/Wow6432Node/Valve/Steam/Apps.

This could allow a service running with SYSTEM privileges to be modified so that it launched a different program with elevated rights.

PoC disclosed by another researcher

After Felix disclosed the vulnerability in a write up, a second researcher named Matt Nelson, who is well known for discovering privilege escalation vulnerabilities under the alias enigma0x3, created proof-of-concept (PoC) code that abuses the flaw. He shared the PoC on GitHub.

Nelson’s PoC creates a symlink back to the HKLM:/SYSTEM/CurrentControlSet/Services/Steam Client Service so that it could change the executable that is launched when the service is restarted.

This is achieved by launching in the background a Windows command prompt with Administrative privileges, as shown below.

The privilege escalation vulnerability
Command Prompt with Elevated Privileges

Nelson says that he too had disclosure issues with Valve.

BleepingComputer has contacted Valve for more questions on why the vulnerability was not fixed, but had not heard back at the time of this publication.

Forum Rules and Posting Guidelines

Bleeping Computer® is a community of individuals of all ages who are here to learn new information, to help each other, and to help their fellow peers. With that in mind, we ask that all members please follow these simple rules in order to create an atmosphere where everyone feels comfortable.

The rules are as follows:

Violation of any of these rules can lead to a banning of the user from our Web Site and a deletion of their account. The consequences will be determined by the Staff on a case by case basis.

When posting you agree that the administrators and the moderators of this forum have the right to modify, delete, edit or close any topic, signature, account, or profile data at any time that they see fit. If you have any questions concerning this, please do not start a new thread, but rather private message to an administrator or moderator.

contact us


Notice: Undefined variable: canUpdate in /var/www/html/wordpress/wp-content/plugins/wp-autopost-pro/wp-autopost-function.php on line 51