The Canon TR150 print driver through 3.71.2.10 is vulnerable to a privilege escalation issue. During the add printer process, a local attacker can overwrite CNMurGE.dll and, if timed properly, the overwritten DLL will be loaded into a SYSTEM process resulting in escalation of privileges. This occurs because the driver drops a world-writable DLL into a CanonBJ %PROGRAMDATA% location that gets loaded by printisolationhost (a system process).
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Link | Tags |
---|---|
https://defcon.org/html/defcon-29/dc-29-speakers.html#baines | third party advisory |
http://packetstormsecurity.com/files/163795/Canon-TR150-Driver-3.71.2.10-Privilege-Escalation.html | exploit vdb entry third party advisory |
https://raw.githubusercontent.com/jacob-baines/vuln_disclosure/main/vuln_2021_03.txt | third party advisory |
https://www.youtube.com/watch?v=vdesswZYz-8 | third party advisory exploit |