Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9h7c-fm35-pjfg

Опубликовано: 15 дек. 2021
Источник: github
Github: Не прошло ревью

Описание

An issue was discovered in Listary through 6. An attacker can create a \.\pipe\Listary.listaryService named pipe and wait for a privileged user to open a session on the Listary installed host. Listary will automatically access the named pipe and the attacker will be able to duplicate the victim's token to impersonate him. This exploit is valid in certain Windows versions (Microsoft has patched the issue in later Windows 10 builds).

An issue was discovered in Listary through 6. An attacker can create a \.\pipe\Listary.listaryService named pipe and wait for a privileged user to open a session on the Listary installed host. Listary will automatically access the named pipe and the attacker will be able to duplicate the victim's token to impersonate him. This exploit is valid in certain Windows versions (Microsoft has patched the issue in later Windows 10 builds).

EPSS

Процентиль: 12%
0.0004
Низкий

Дефекты

CWE-668

Связанные уязвимости

CVSS3: 7.3
nvd
около 4 лет назад

An issue was discovered in Listary through 6. An attacker can create a \\.\pipe\Listary.listaryService named pipe and wait for a privileged user to open a session on the Listary installed host. Listary will automatically access the named pipe and the attacker will be able to duplicate the victim's token to impersonate him. This exploit is valid in certain Windows versions (Microsoft has patched the issue in later Windows 10 builds).

EPSS

Процентиль: 12%
0.0004
Низкий

Дефекты

CWE-668