← Advisories

Electronic Arts Origin Client 9.5.5 Multiple Privilege Escalation Vulnerabilities

Medium
Advisory ID
ZSL-2015-5231
Release Date
26 February 2015
Vendor
Electronic Arts Inc. - https://www.origin.com
Affected Version
9.5.5.2850 (353317), 9.5.3.636 (350385), 9.5.2.2829 (348065)
CVE
N/A
Tested On
Microsoft Windows 7 Professional SP1 (EN), Microsoft Windows 7 Ultimate SP1 (EN)
Summary

Origin (formerly EA Download Manager (EADM)) is digital distribution software from Electronic Arts that allows users to purchase games on the internet for PC and mobile platforms, and download them with the Origin client (formerly EA Download Manager, EA Downloader and EA Link).

Description

The application is vulnerable to an elevation of privileges vulnerability which can be used by a simple user that can change the executable file with a binary of choice. The vulnerability exist due to the improper permissions, with the 'F' flag (full) for the 'Everyone' and 'Users' group, for the 'OriginClientService.exe' binary file, and for all the files in the 'Origin' directory. The service is installed by default to start on system boot with LocalSystem privileges. Attackers can replace the binary with their rootkit, and on reboot they get SYSTEM privileges.

Origin client service also suffers from an unquoted search path issue impacting the 'Origin Client Service' service for Windows deployed as part of the Origin Thin Setup bundle. This could potentially allow an authorized but non-privileged local user to execute arbitrary code with elevated privileges on the system. A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user’s code would execute with the elevated privileges of the application.

Proof of Concept
Disclosure Timeline
14.12.2014Vulnerabilities discovered.
15.12.2014Contact with the vendor.
16.12.2014Vendor responds asking more details.
17.12.2014Sent details to the vendor.
19.12.2014Asked vendor for status update.
19.12.2014Vendor still investigating.
06.01.2015Vendor confirms vulnerabilities, working on patch.
12.01.2015Asked vendor for status update and scheduled patch release date.
12.01.2015Vendor replies.
12.01.2015Working with the vendor.
07.02.2015Vendor informs of work and verification completion of the changes.
07.02.2015Vendor schedules patch release date.
26.02.2015Vendor releases version 9.5.6.731 (358982) to address these issues.
26.02.2015Coordinated public security advisory released.
Credits
Vulnerability discovered by Gjoko Krstic
References
Changelog
26.02.2015Initial release
02.03.2015Added reference [3], [4] and [5]
07.03.2015Added reference [6]
12.03.2015Added reference [7] and [8]