Vulnerabilities > CVE-2005-1970 - Local Privileged Command Execution vulnerability in Symantec PCAnywhere

047910
CVSS 7.2 - HIGH
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
local
low complexity
symantec
nessus

Summary

Symantec pcAnywhere 10.5x and 11.x before 11.5, with "Launch with Windows" enabled, allows local users with physical access to execute arbitrary commands via the Caller Properties feature.

Nessus

NASL familyWindows
NASL idPCANYWHERE_LAUNCH_WITH_WINDOWS_PRIV_ESCALATION.NASL
descriptionThe remote host is running pcAnywhere, a remote control software program for Windows. According to the Windows registry, the installed version of pcAnywhere allows a local user to gain SYSTEM privileges by manipulating the
last seen2020-06-01
modified2020-06-02
plugin id20743
published2006-01-18
reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/20743
titleSymantec pcAnywhere Launch with Windows Caller Properties Local Privilege Escalation
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if (description) {
  script_id(20743);
  script_version("1.13");

  script_cve_id("CVE-2005-1970");
  script_bugtraq_id(13933);

  script_name(english:"Symantec pcAnywhere Launch with Windows Caller Properties Local Privilege Escalation");
  script_summary(english:"Checks for Launch with Windows privilege escalation vulnerability in pcAnywhere");

 script_set_attribute(attribute:"synopsis", value:
"The remote control software on the remote host is affected by a local
privilege escalation flaw." );
 script_set_attribute(attribute:"description", value:
"The remote host is running pcAnywhere, a remote control software
program for Windows. 

According to the Windows registry, the installed version of pcAnywhere
allows a local user to gain SYSTEM privileges by manipulating the
'Caller Properties' feature to run arbitrary commands when pcAnywhere
is configured to run as a service." );
   # http://securityresponse.symantec.com/avcenter/security/Content/2005.06.10.html
 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?82040b0f" );
 script_set_attribute(attribute:"solution", value:
"Upgrade to pcAnywhere version 11.5 or later." );
 script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_set_attribute(attribute:"plugin_publication_date", value: "2006/01/18");
 script_set_attribute(attribute:"vuln_publication_date", value: "2005/06/10");
 script_cvs_date("Date: 2018/07/24 18:56:13");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe",value:"cpe:/a:symantec:pcanywhere");
script_end_attributes();

 
  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.");

  script_dependencies("smb_enum_services.nasl", "smb_hotfixes.nasl");
  script_require_keys("SMB/Registry/Enumerated");

  exit(0);
}


include("global_settings.inc");


if (!get_kb_item("SMB/Registry/Enumerated")) exit(0);


# Unless we're paranoid, make sure pcAnywhere is running as a service.
if (report_paranoia < 2) {
  services = get_kb_item("SMB/svcs");
  if (
    services &&
    (
      "awhost32" >!< services &&
      "pcAnywhere Host Service" >!< services
    )
  ) exit(0);
}


# Look in the registry for evidence of pcAnywhere.
key = "SMB/Registry/HKLM/SOFTWARE/Microsoft/Windows/CurrentVersion/Uninstall/{E05E8183-866A-11D3-97DF-0000F8D8F2E9}";
name = get_kb_item(string(key, "/DisplayName"));
if (name && "pcAnywhere" >< name) {
  ver = get_kb_item(string(key, "/DisplayVersion"));

  # There's a problem if it's before 11.5.
  if (ver && ver =~ "^([0-9]\.|10\.|11\.[0-4]\.)") {
    security_hole(get_kb_item("SMB/transport"));
  }
}