Files
cve/2013/CVE-2013-10046.md

21 lines
1.4 KiB
Markdown
Raw Permalink Normal View History

2025-09-29 21:09:30 +02:00
### [CVE-2013-10046](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-10046)
![](https://img.shields.io/static/v1?label=Product&message=Outpost%20Internet%20Security&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=8.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20('Path%20Traversal')&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-306%20Missing%20Authentication%20for%20Critical%20Function&color=brightgreen)
### Description
A local privilege escalation vulnerability exists in Agnitum Outpost Internet Security 8.1 that allows an unprivileged user to execute arbitrary code with SYSTEM privileges. The flaw resides in the acs.exe component, which exposes a named pipe that accepts unauthenticated commands. By exploiting a directory traversal weakness in the pipe protocol, an attacker can instruct the service to load a malicious DLL from a user-controlled location. The DLL is then executed in the context of the privileged service.
### POC
#### Reference
- https://www.exploit-db.com/exploits/27282
- https://www.exploit-db.com/exploits/28335
- https://www.vulncheck.com/advisories/agnitum-outpost-internet-security-local-priv-esc
#### Github
No PoCs found on GitHub currently.