Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-11742

Опубликовано: 30 июл. 2017
Источник: debian
EPSS Низкий

Описание

The writeRandomBytes_RtlGenRandom function in xmlparse.c in libexpat in Expat 2.2.1 and 2.2.2 on Windows allows local users to gain privileges via a Trojan horse ADVAPI32.DLL in the current working directory because of an untrusted search path, aka DLL hijacking.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
expatnot-affectedpackage
libxmltoknot-affectedpackage

EPSS

Процентиль: 4%
0.00019
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 8 лет назад

The writeRandomBytes_RtlGenRandom function in xmlparse.c in libexpat in Expat 2.2.1 and 2.2.2 on Windows allows local users to gain privileges via a Trojan horse ADVAPI32.DLL in the current working directory because of an untrusted search path, aka DLL hijacking.

CVSS3: 7.8
nvd
больше 8 лет назад

The writeRandomBytes_RtlGenRandom function in xmlparse.c in libexpat in Expat 2.2.1 and 2.2.2 on Windows allows local users to gain privileges via a Trojan horse ADVAPI32.DLL in the current working directory because of an untrusted search path, aka DLL hijacking.

CVSS3: 7.8
github
больше 3 лет назад

The writeRandomBytes_RtlGenRandom function in xmlparse.c in libexpat in Expat 2.2.1 and 2.2.2 on Windows allows local users to gain privileges via a Trojan horse ADVAPI32.DLL in the current working directory because of an untrusted search path, aka DLL hijacking.

EPSS

Процентиль: 4%
0.00019
Низкий