Overview
There is a vulnerability in version 4.01 of ScriptLogic that may allow local or domain users to gain administrative access to workstations running the ScriptLogic RunAdmin service.
Description
The ScriptLogic product from ScriptLogic, Inc. provides remote system administration capabilities for Microsoft Windows systems in a domain. A vulnerability in the RunAdmin service included in version 4.01 of the ScriptLogic software could allow a local user to gain administrative access to any workstations in the domain that are managed by the ScriptLogic server. According to ScriptLogic, "the ScriptLogic RunAdmin services (SLRAserver.exe & SLRAclient.exe) are used to perform configurations on the client workstation when the user logging on does not have Administrative privileges." The RunAdmin service runs in the context of a domain account (typically SLSVCUSER or similar) that is added to the Local Administrators group by the installation program. Version 4.01 of ScriptLogic, as tested by the CERT/CC, fails to prevent normal users from making requests supplied with configuration data of their own choosing. As a result, it is possible for normal users to use the RunAdmin service to execute arbitrary commands with the privileges of the SLSVCUSER account. If a malicious end-user requests his/her own configuration be executed by a ScriptLogic client, this would in turn cause the ScriptLogic RunAdmin client service to be installed to the machine (if it was not already present), and the RunAdmin client to execute the applications specified in the malicious configuration with the privileges of a local administrator (i.e., under the security context of the RunAdmin client service). |
Impact
Local users can gain administrative control of workstations with the ScriptLogic RunAdmin service installed. This access can be leveraged to gain administrative control of other workstations in the domain that have had the SLSVCUSER account added to the Local Administrators group (e.g., as a result of the ScriptLogic RunAdmin service being installed) and have the default administrative shares enabled. |
Solution
Upgrade to the latest version of the software |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This document was written by Chad R Dougherty. Technical assistance during testing was provided by Art Manion and Matt Lytle. The CERT/CC appreciates ScriptLogic, Inc.'s cooperation in providing an updated copy of the software for the purpose of vulnerability testing.
Other Information
CVE IDs: | None |
Severity Metric: | 5.27 |
Date Public: | 2003-04-30 |
Date First Published: | 2003-04-30 |
Date Last Updated: | 2003-04-30 20:10 UTC |
Document Revision: | 28 |