Agnitum Outpost Security Suite 8.1 - Local Privilege Escalation

EDB-ID:

27282

CVE:





Platform:

Windows

Date:

2013-08-02


Become a Certified Penetration Tester

Enroll in Penetration Testing with Kali Linux , the course required to become an Offensive Security Certified Professional (OSCP)

GET CERTIFIED

# Exploit Title: Agnitum Outpost security suite privilege escalation - 0Day
# Date: 2013-08-02
# Exploit Author: Ahmad Moghimi (http://mallocat.com
<http://mallocat.com/>, https://twitter.com/mall0cat)
# Vendor Homepage: http://www.agnitum.com/
# Software Link: http://dl2.agnitum.com/OutpostSecuritySuiteProInstall.exe
# Version: 8.1 Latest build
# Tested on: windows
# CVE : NO-CVE

Reference: http://mallocat.com/a-journey-to-antivirus-escalation/
Demo: http://mallocat.com/wp-content/uploads/2013/08/win7.swf
Exploit code: http://mallocat.com/wp-content/uploads/2013/08/escalate.7z
              https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27282.7z

Exploit-DB note:
Open and read the reference supplied

From low privileged account
#1) Register Regsvr32.exe /s C:\Program Files\agnitum\Outpost Security Suite Pro\..\..\..\x.dll
#2) Run exploit.exe