The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

vulnerability 5540

VPN-1: program execution by SecureClient

Synthesis of the vulnerability

An attacker can store a program on system, in order to make it run by SecureClient.
Vulnerable systems: CheckPoint SecureClient, CheckPoint SecuRemote, VPN-1, Kaspersky AV, Windows 2000, Windows NT.
Severity of this threat: 1/4.
Consequences of an attack: privileged access/rights.
Pirate's origin: user account.
Creation date: 19/01/2006.
Références of this weakness: TZO-012006, VIGILANCE-VUL-5540.

Description of the vulnerability

The SR_Watchdog.exe program runs the SR_GUI.exe graphical interface using CreateProcess() function:
  C:\Program Files\CheckPoint\SecuRemote\bin\SR_GUI.exe

However, this path is not enclosed between quotes. When permissions permit it, an attacker can thus create a program with a short name:
  C:\Program.exe

This program is then run with SR_Watchdog.exe rights.
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides a computers vulnerabilities alert. The technology watch team tracks security threats targeting the computer system. The Vigil@nce vulnerability database contains several thousand vulnerabilities. Each administrator can customize the list of products for which he wants to receive vulnerability alerts.