[Blog] Local Privilege Escalation in EA's Origin Clienthttps://enigma0x3.net/2019/12/10/cve-2019-19248-local-privilege-escalation-in-eas-origin-client/ …
-
-
Replying to @enigma0x3 @xorrior
I'm having a difficult time deconflicting the documentation about the Local Service account https://docs.microsoft.com/en-us/windows/win32/services/localservice-account … vs. the behavior of the Origin Web Helper service. The former states that the account "has minimum privileges on the local computer" The latter runs it as SYSTEM.pic.twitter.com/jMWTy0yhHB
3 replies 2 retweets 2 likes -
Also, I'm not convinced that this vulnerability has been fixed in 10.5.56.33908. - Clean install of Origin 10.5.56.33908 - Limited user used - Hard link created - Link target (OriginWebHelperService.exe in this case) DACLS are clobbered to allow Everyone "Full control" ¯\_(ツ)_/¯pic.twitter.com/p8BF8ybawq
1 reply 0 retweets 2 likes -
You have to enable Restricted User mode in the clienthttps://www.ea.com/security/news/easec-2019-001-elevation-of-privilege-vulnerability-in-origin-client …
2 replies 0 retweets 0 likes
Oh, clever. A vulnerability where the fixed version doesn't actually fix anything. It just gives you the option of manually enabling the fix. @EA doesn't even link "here" to the instructions on how to do so.
A job done!
Don't install games on systems that you care about, folks!pic.twitter.com/CISnr2TeX9
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.