Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Local Privilege Escalation via Weak Service Binary Permissions
Vulnerability Description
Attackers with local access to the medical office computer can escalate their Windows user privileges to "NT AUTHORITY\SYSTEM" by overwriting one of two Elefant service binaries with weak permissions. The default installation directory of Elefant is "C:\Elefant1" which is writable for all users. In addition, the Elefant installer registers two Firebird database services which are running as “NT AUTHORITY\SYSTEM”. Path: C:\Elefant1\Firebird_2\bin\fbserver.exe Path: C:\Elefant1\Firebird_2\bin\fbguard.exe Both service binaries are user writable. This means that a local attacker can rename one of the service binaries, replace the service executable with a new executable, and then restart the system. Once the system has rebooted, the new service binary is executed as "NT AUTHORITY\SYSTEM".
CVSS Information
N/A
Vulnerability Type
缺省权限不正确
Vulnerability Title
HASOMED Elefant 安全漏洞
Vulnerability Description
HASOMED Elefant是德国HASOMED公司的一个练习软件。专门满足心理治疗师、儿童和青少年心理治疗师以及医学心理治疗师的需求。 HASOMED Elefant存在安全漏洞,该漏洞源于对医疗办公室计算机具有本地访问权限的攻击者可以通过覆盖具有弱权限的两个 Elefant 服务二进制文件之一,可以将其 Windows 用户权限提升到“NT AUTHORITYSYSTEM”。
CVSS Information
N/A
Vulnerability Type
N/A