21 lines
No EOL
889 B
Text
21 lines
No EOL
889 B
Text
# Exploit Title: Agnitum Outpost security suite privilege escalation - 0Day
|
|
# Date: 2013-08-02
|
|
# Exploit Author: Ahmad Moghimi (http://mallocat.com
|
|
<http://mallocat.com/>, https://twitter.com/mall0cat)
|
|
# Vendor Homepage: http://www.agnitum.com/
|
|
# Software Link: http://dl2.agnitum.com/OutpostSecuritySuiteProInstall.exe
|
|
# Version: 8.1 Latest build
|
|
# Tested on: windows
|
|
# CVE : NO-CVE
|
|
|
|
Reference: http://mallocat.com/a-journey-to-antivirus-escalation/
|
|
Demo: http://mallocat.com/wp-content/uploads/2013/08/win7.swf
|
|
Exploit code: http://mallocat.com/wp-content/uploads/2013/08/escalate.7z
|
|
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27282.7z
|
|
|
|
Exploit-DB note:
|
|
Open and read the reference supplied
|
|
|
|
From low privileged account
|
|
#1) Register Regsvr32.exe /s C:\Program Files\agnitum\Outpost Security Suite Pro\..\..\..\x.dll
|
|
#2) Run exploit.exe |