Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-11644

Опубликовано: 17 мая 2019
Источник: nvd
CVSS3: 7.8
CVSS2: 6.8
EPSS Низкий

Описание

In the F-Secure installer in F-Secure SAFE for Windows before 17.6, F-Secure Internet Security before 17.6, F-Secure Anti-Virus before 17.6, F-Secure Client Security Standard and Premium before 14.10, F-Secure PSB Workstation Security before 12.01, and F-Secure Computer Protection Standard and Premium before 19.3, a local user can escalate their privileges through a DLL hijacking attack against the installer. The installer writes the file rm.exe to C:\Windows\Temp and then executes it. The rm.exe process then attempts to load several DLLs from its current directory. Non-admin users are able to write to this folder, so an attacker can create a malicious C:\Windows\Temp\OLEACC.dll file. When an admin runs the installer, rm.exe will execute the attacker's DLL in an elevated security context.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:f-secure:client_security:*:*:*:*:premium:*:*:*
Версия до 14.10 (исключая)
cpe:2.3:a:f-secure:client_security:*:*:*:*:standard:*:*:*
Версия до 14.10 (исключая)
cpe:2.3:a:f-secure:computer_protection:*:*:*:*:premium:*:*:*
Версия до 19.3 (исключая)
cpe:2.3:a:f-secure:computer_protection:*:*:*:*:standard:*:*:*
Версия до 19.3 (исключая)
cpe:2.3:a:f-secure:internet_security:*:*:*:*:*:*:*:*
Версия до 17.6 (исключая)
cpe:2.3:a:f-secure:psb_workstation_security:*:*:*:*:*:*:*:*
Версия до 12.01 (исключая)
cpe:2.3:a:f-secure:safe:*:*:*:*:*:windows:*:*
Версия до 17.6 (исключая)

EPSS

Процентиль: 60%
0.00398
Низкий

7.8 High

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-427

Связанные уязвимости

github
больше 3 лет назад

In the F-Secure installer in F-Secure SAFE for Windows before 17.6, F-Secure Internet Security before 17.6, F-Secure Anti-Virus before 17.6, F-Secure Client Security Standard and Premium before 14.10, F-Secure PSB Workstation Security before 12.01, and F-Secure Computer Protection Standard and Premium before 19.3, a local user can escalate their privileges through a DLL hijacking attack against the installer. The installer writes the file rm.exe to C:\Windows\Temp and then executes it. The rm.exe process then attempts to load several DLLs from its current directory. Non-admin users are able to write to this folder, so an attacker can create a malicious C:\Windows\Temp\OLEACC.dll file. When an admin runs the installer, rm.exe will execute the attacker's DLL in an elevated security context.

EPSS

Процентиль: 60%
0.00398
Низкий

7.8 High

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-427