Electronic Arts Origin Client 9.5.5 Multiple Privilege Escalation Vulnerabilities

Title: Electronic Arts Origin Client 9.5.5 Multiple Privilege Escalation Vulnerabilities
Advisory ID: ZSL-2015-5231
Type: Local
Impact: Privilege Escalation
Risk: (3/5)
Release Date: 26.02.2015
Origin (formerly EA Download Manager (EADM)) is digital distribution software from Electronic Arts that allows users to purchase games on the internet for PC and mobile platforms, and download them with the Origin client (formerly EA Download Manager, EA Downloader and EA Link).
The application is vulnerable to an elevation of privileges vulnerability which can be used by a simple user that can change the executable file with a binary of choice. The vulnerability exist due to the improper permissions, with the 'F' flag (full) for the 'Everyone' and 'Users' group, for the 'OriginClientService.exe' binary file, and for all the files in the 'Origin' directory. The service is installed by default to start on system boot with LocalSystem privileges. Attackers can replace the binary with their rootkit, and on reboot they get SYSTEM privileges.

Origin client service also suffers from an unquoted search path issue impacting the 'Origin Client Service' service for Windows deployed as part of the Origin Thin Setup bundle. This could potentially allow an authorized but non-privileged local user to execute arbitrary code with elevated privileges on the system. A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user’s code would execute with the elevated privileges of the application.
Electronic Arts Inc. - https://www.origin.com
Affected Version (353317) (350385) (348065)
Tested On
Microsoft Windows 7 Professional SP1 (EN)
Microsoft Windows 7 Ultimate SP1 (EN)
Vendor Status
[14.12.2014] Vulnerabilities discovered.
[15.12.2014] Contact with the vendor.
[16.12.2014] Vendor responds asking more details.
[17.12.2014] Sent details to the vendor.
[19.12.2014] Asked vendor for status update.
[19.12.2014] Vendor still investigating.
[06.01.2015] Vendor confirms vulnerabilities, working on patch.
[12.01.2015] Asked vendor for status update and scheduled patch release date.
[12.01.2015] Vendor replies.
[12.01.2015] Working with the vendor.
[07.02.2015] Vendor informs of work and verification completion of the changes.
[07.02.2015] Vendor schedules patch release date.
[26.02.2015] Vendor releases version (358982) to address these issues.
[26.02.2015] Coordinated public security advisory released.
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>
[1] https://www.origin.com/en-ie/download
[2] http://cxsecurity.com/issue/WLB-2015020139
[3] http://osvdb.org/show/osvdb/118920
[4] http://packetstormsecurity.com/files/130568
[5] http://www.exploit-db.com/exploits/36188/
[6] http://secunia.com/advisories/63121/
[7] https://exchange.xforce.ibmcloud.com/#/vulnerabilities/101231
[8] https://exchange.xforce.ibmcloud.com/#/vulnerabilities/101232
[26.02.2015] - Initial release
[02.03.2015] - Added reference [3], [4] and [5]
[07.03.2015] - Added reference [6]
[12.03.2015] - Added reference [7] and [8]
Zero Science Lab

Web: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk