Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2018-8569

Опубликовано: 19 окт. 2018
Источник: msrc
EPSS Средний

Описание

Yammer Desktop Application Remote Code Execution Vulnerability

A remote code execution vulnerability exists in the Yammer desktop application due to the loading of arbitrary content. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

To exploit this vulnerability, an attacker needs to convince the victim to click the special URL in the desktop application that redirect to the attacker-controlled web-page. After the content from attacker-controlled web-page is loaded by the desktop application, the attacker can gain control of the victim’s machine.

The security update addresses the vulnerability by disallowing loading of arbitrary content in the desktop application.

Обновления

ПродуктСтатьяОбновление
Yammer Desktop App

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

EPSS

Процентиль: 96%
0.24198
Средний

Связанные уязвимости

CVSS3: 7.8
nvd
почти 7 лет назад

A remote code execution vulnerability exists in the Yammer desktop application due to the loading of arbitrary content, aka "Yammer Desktop Application Remote Code Execution Vulnerability." This affects Yammer Desktop App.

CVSS3: 7.8
github
больше 3 лет назад

A remote code execution vulnerability exists in the Yammer desktop application due to the loading of arbitrary content, aka "Yammer Desktop Application Remote Code Execution Vulnerability." This affects Yammer Desktop App.

EPSS

Процентиль: 96%
0.24198
Средний