Home / vulnerabilities Fujitsu Desktop Update Privilege Escalation
Posted on 09 May 2013
Source : packetstormsecurity.org Link
Hi @ll,
Fujitsu's update utility "Fujitsu Desktop Update" (see
<http://support.ts.fujitsu.com/DeskUpdate/Index.asp>), which is
factory-preinstalled on every Fujitsu (Siemens) PC with Windows,
has a vulnerability which allows the execution of a rogue program
in the security context of the current user.
The application is registered as control panel item via
[HKLMSOFTWAREMicrosoftWindowsCurrentVersionExplorerControlPanelNameSpace{070B64FF-795D-4DAA-88AD-6D3277C7E445}]
@="Fujitsu DeskUpdate"
The "shell object" with GUID {070B64FF-795D-4DAA-88AD-6D3277C7E445} is
registered with
[HKLMSOFTWAREClassesCLSID{070B64FF-795D-4DAA-88AD-6D3277C7E445}]
@="Fujitsu DeskUpdate"
"InfoTip"=expand:"@C:\Program Files (x86)\Fujitsu\DeskUpdate\DeskUpdate.exe,-132"
"System.ControlPanel.Category"=dword:00000005
"System.Software.TasksFileUrl"="C:\Program Files (x86)\FujitsuDeskUpdate\duconfig.xml"
[HKLMSOFTWAREClassesCLSID{070B64FF-795D-4DAA-88AD-6D3277C7E445}DefaultIcon]
@=expand:"C:\Program Files (x86)\Fujitsu\DeskUpdate\DeskUpdate.exe,-0"
[HKLMSOFTWAREClassesCLSID{070B64FF-795D-4DAA-88AD-6D3277C7E445}ShellOpenCommand]
@="C:\Program Files (x86)\Fujitsu\DeskUpdate\DeskUpdate.exe"
The last entry is a pathname with unquoted spaces and allows the
execution of the rogue programs "C:Program.exe" and/or
"C:Program Files.exe", as documented in
<http://msdn.microsoft.com/library/ms682425.aspx>
Stefan Kanthak
PS: long pathnames containing spaces exist for about 20 years
now in Windows, EVERY developer should know how to use them
properly, and EVERY QA should check their proper use!
