<<< Date Index >>>     <<< Thread Index >>>

KillProcess 2.20 and priors "FileDescription" Local Buffer Overflow Issue




VULNERABLE PRODUCT
------------------
Software: KillProcess
Platforms: Windows
Version: 2.20 and priors
Original advisorie: http://sbox.nightmail.ru
--------------------------


BACKGROUND
----------
This funny application can terminate any Windows process with the click of a 
button. 
It can also prevent unwanted processes from ever executing by scanning the 
active 
process list for unwanted processes and terminating them on sight.
Source: http://orangelampsoftware.com


DESCRIPTION
-------------
A malicious .exe file with a long FileDescription in version resource can 
generate
a local exploitation of a buffer overflow and allows attackers to execute 
arbitrary code.


PROOF OF CONCEPT
----------------
I've code a 2,78 Ko PoC.
FileDescription have been set to A x 544 bytes.
PoC is available here: http://sbox.nightmail.ru/KillProc_PoC.exe

There is another little bug, but not really dangerous.
If you add an application to killlist, then lunch it. Ok, boom ...
But if you start XX same process at the same time, all applications will not be 
killed.


ANALYSIS
--------
Exploitation of the described vulnerability allows attackers to
execute arbitrary code under the context of the user who started Process 
Explorer.
Exploitation requires that an attacker convince a target user to view 
properties of
malicious executable file with a vulnerable version of Process Explorer.


VENDOR STATUS
-------------
Vendor have been contacted.


Thanks
------
Greet's fly out to ATmaCA. This idea was first credit by Kozan.
It was on Jul 20 2005, for another software, so thanks to him ;)


CREDiTS
----------------------
SecuBox Labs - fRoGGz
web: secubox.teria.org
--------------------------