Loading HuntDB...

Arbitrary DLL injection in mmsminisrv (Acronis Managed Machine Service Mini)

High
A
Acronis
Submitted None
Reported by adr

Vulnerability Details

Technical details and impact analysis

Privilege Escalation
During initialization, **mms_mini.exe** (service binary of mmsminisrv) loads library *C:\Program Files (x86)\Common Files\Acronis\Home\libssl10.dll*. The library then tries to load non-existing file: *C:\bs_hudson\workspace\mod-openssl-fips-win\205\product\out\standard\vs_2013_release\OpenSSL\ssl\openssl.cnf*. The path seems to be hardcoded leftover from compilation. {F926518} Because by default any user is able to create directories on C:\ drive, it is possible to create missing directories and missing file (*openssl.cnf*). The OpenSSL config file implements support for loading additional DLL modules. Attacker may point to arbitrary DLL which will be loaded by service running with Local System privileges. Once service is restarted (e.g. due to system reboot), the planted library is loaded by the service and arbitrary code is executed. The code would typically add new Administrative user to the Windows system or establish reverse shell connection. Successful injection of arbitrary library is shown on procmon log: {F926535} # Steps to reproduce 1. Create directories: ```mkdir C:\bs_hudson\workspace\mod-openssl-fips-win\205\product\out\standard\vs_2013_release\OpenSSL\ssl``` 2. Inside, create openssl.cnf file with following content (replace DLL path with any path you wish): ``` openssl_conf = openssl_init [openssl_init] engines = engine_section [engine_section] woot = woot_section [woot_section] engine_id = woot dynamic_path = c:\\temp\\cqbeacondll.dll init = 0 ``` 3. Plant arbitrary DLL under *dynamic_path* location. 4. Wait for service to start (or force it by rebooting system) ## Impact After successful attack, low privileged local user can elevate privileges up to Local System (the highest Windows privilege). The vulnerability can be also exploited by malware with local system access.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Privilege Escalation