Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-crcr-fw92-82g6

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

A vulnerability in the dynamic link library (DLL) loading mechanism in Cisco Advanced Malware Protection (AMP) for Endpoints Windows Connector, ClamAV for Windows, and Immunet could allow an authenticated, local attacker to perform a DLL hijacking attack on an affected Windows system. To exploit this vulnerability, the attacker would need valid credentials on the system. The vulnerability is due to insufficient validation of directory search paths at run time. An attacker could exploit this vulnerability by placing a malicious DLL file on an affected system. A successful exploit could allow the attacker to execute arbitrary code with SYSTEM privileges.

A vulnerability in the dynamic link library (DLL) loading mechanism in Cisco Advanced Malware Protection (AMP) for Endpoints Windows Connector, ClamAV for Windows, and Immunet could allow an authenticated, local attacker to perform a DLL hijacking attack on an affected Windows system. To exploit this vulnerability, the attacker would need valid credentials on the system. The vulnerability is due to insufficient validation of directory search paths at run time. An attacker could exploit this vulnerability by placing a malicious DLL file on an affected system. A successful exploit could allow the attacker to execute arbitrary code with SYSTEM privileges.

EPSS

Процентиль: 19%
0.00059
Низкий

Дефекты

CWE-427

Связанные уязвимости

CVSS3: 7
nvd
почти 5 лет назад

A vulnerability in the dynamic link library (DLL) loading mechanism in Cisco Advanced Malware Protection (AMP) for Endpoints Windows Connector, ClamAV for Windows, and Immunet could allow an authenticated, local attacker to perform a DLL hijacking attack on an affected Windows system. To exploit this vulnerability, the attacker would need valid credentials on the system. The vulnerability is due to insufficient validation of directory search paths at run time. An attacker could exploit this vulnerability by placing a malicious DLL file on an affected system. A successful exploit could allow the attacker to execute arbitrary code with SYSTEM privileges.

CVSS3: 7.8
msrc
почти 5 лет назад

Описание отсутствует

CVSS3: 7
fstec
почти 5 лет назад

Уязвимость средств защиты Cisco Immune, Cisco Advanced Malware Protection for Endpoints for Windows и пакета антивирусных программ ClamAV for Windows, связанная с ошибками механизма проверки пути поиска динамически подключаемых библиотек (DLL), позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 19%
0.00059
Низкий

Дефекты

CWE-427