It's very limited use. But it is a vulnerability. . If an Unprivileged user can write to the root of c: but NOT to any sensitive subdirectory they can't do much harm. This allows them a route to escalate their priveleges.
Admittedly. .. for a user to be able to write to c but not write to Windows/program files anyway (and overwrite whatever they want) is a bit of an edge case but it might crop up in a pen test! On 21 May 2014 05:58, "Tavis Ormandy" <tav...@cmpxchg8b.com> wrote: > "Stefan Kanthak" <stefan.kant...@nexgo.de> wrote: > > > Hi @ll, > > > > several programs of the current Windows 7 driver software for the "HP > > OfficeJet 6700" multifunction device execute a rogue program > > C:\Program.exe > > > > > > It sounds like a bug, but why is this a security issue? I can only imagine > two possible scenarios > > 1. You've somehow made the root parition FAT32, in which case you're using > a > non-securable filesystem; Therefore not a security issue. > 2. You've set a bad ACL on the root directory, therefore user error. > > If you believe otherwise, please post details, as that would be an > interesting discovery. > > Tavis. > > > _______________________________________________ > Sent through the Full Disclosure mailing list > http://nmap.org/mailman/listinfo/fulldisclosure > Web Archives & RSS: http://seclists.org/fulldisclosure/ > _______________________________________________ Sent through the Full Disclosure mailing list http://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/