Executive Summary

Summary
Title EPSON Network Utility installs EpsonBidirectionalService with insecure permissions
Informations
Name VU#672500 First vendor Publication 2015-10-27
Vendor VU-CERT Last vendor Modification 2015-11-17
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 6.9 Attack Range Local
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 3.4 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#672500

EPSON Network Utility installs EpsonBidirectionalService with insecure permissions

Original Release date: 27 Oct 2015 | Last revised: 17 Nov 2015

Overview

EPSON Network Utility contains a local privilege escalation vulnerability, which allows a local attacker to execute arbitrary code with SYSTEM privileges.

Description

CWE-276: Incorrect Default Permissions - CVE-2015-6034

EPSON Network Utility v4.10 is an application that checks the printer status and displays the printing progress over the network. During installation, the EPSON Network Utility creates EpsonBidirectionalService which runs as SYSTEM. The corresponding executable, eEBSVC.exe, has insecure permissions, allowing full access to the "Everyone" group in Windows. By replacing eEBSVC.exe with a malicious file of the same name, an attacker can execute arbitrary code with SYSTEM privileges.

Impact

A local, authenticated attacker can execute arbitrary code with SYSTEM privileges.

Solution

Apply an update

EPSON has released an update addressing CVE-2015-6034. Affected users are encouraged to update as soon as possible.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Epson America, Inc.Affected14 Aug 201517 Nov 2015
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

GroupScoreVector
Base6.6AV:L/AC:M/Au:S/C:C/I:C/A:C
Temporal5.5E:F/RL:OF/RC:C
Environmental4.1CDP:N/TD:M/CR:ND/IR:ND/AR:ND

References

  • https://www.epson.com/cgi-bin/Store/support/supAdvice.jsp?type=highlights¬eoid=288045
  • http://cwe.mitre.org/data/definitions/708

Credit

Thanks to Will Hunt of 7Safe Ltd for reporting this vulnerability.

This document was written by Brian Gardiner.

Other Information

  • CVE IDs:CVE-2015-6034
  • Date Public:27 Oct 2015
  • Date First Published:27 Oct 2015
  • Date Last Updated:17 Nov 2015
  • Document Revision:41

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Original Source

Url : http://www.kb.cert.org/vuls/id/672500

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-264 Permissions, Privileges, and Access Controls

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
Date Informations
2015-11-17 17:21:40
  • Multiple Updates
2015-11-11 21:22:43
  • Multiple Updates
2015-10-29 21:28:04
  • Multiple Updates
2015-10-29 00:27:10
  • Multiple Updates
2015-10-27 17:19:16
  • First insertion