Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-26941

Опубликовано: 26 янв. 2021
Источник: nvd
CVSS3: 5.5
CVSS2: 3.6
EPSS Низкий

Описание

A local (authenticated) low-privileged user can exploit a behavior in an ESET installer to achieve arbitrary file overwrite (deletion) of any file via a symlink, due to insecure permissions. The possibility of exploiting this vulnerability is limited and can only take place during the installation phase of ESET products. Furthermore, exploitation can only succeed when Self-Defense is disabled. Affected products are: ESET NOD32 Antivirus, ESET Internet Security, ESET Smart Security, ESET Smart Security Premium versions 13.2 and lower; ESET Endpoint Antivirus, ESET Endpoint Security, ESET NOD32 Antivirus Business Edition, ESET Smart Security Business Edition versions 7.3 and lower; ESET File Security for Microsoft Windows Server, ESET Mail Security for Microsoft Exchange Server, ESET Mail Security for IBM Domino, ESET Security for Kerio, ESET Security for Microsoft SharePoint Server versions 7.2 and lower.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:-:*:*
Версия до 7.3 (включая)
cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:*:*:*
Версия до 7.3 (включая)
cpe:2.3:a:eset:file_security:*:*:*:*:*:windows_server:*:*
Версия до 7.2 (включая)
cpe:2.3:a:eset:internet_security:*:*:*:*:*:*:*:*
Версия до 13.2 (включая)
cpe:2.3:a:eset:internet_security:1294:*:*:*:*:*:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*
Версия до 7.2 (включая)
cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*
Версия до 7.2 (включая)
cpe:2.3:a:eset:nod32_antivirus:*:*:*:*:business:*:*:*
Версия до 7.3 (включая)
cpe:2.3:a:eset:nod32_antivirus:*:*:*:*:*:-:*:*
Версия до 13.2 (включая)
cpe:2.3:a:eset:security:*:*:*:*:*:kerio:*:*
Версия до 7.2 (включая)
cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:*
Версия до 7.2 (включая)
cpe:2.3:a:eset:smart_security:*:*:*:*:business:*:*:*
Версия до 7.3 (включая)
cpe:2.3:a:eset:smart_security:*:*:*:*:-:*:*:*
Версия до 13.2 (включая)
cpe:2.3:a:eset:smart_security:*:*:*:*:premium:*:*:*
Версия до 13.2 (включая)

EPSS

Процентиль: 9%
0.00032
Низкий

5.5 Medium

CVSS3

3.6 Low

CVSS2

Дефекты

CWE-276

Связанные уязвимости

github
больше 3 лет назад

A local (authenticated) low-privileged user can exploit a behavior in an ESET installer to achieve arbitrary file overwrite (deletion) of any file via a symlink, due to insecure permissions. The possibility of exploiting this vulnerability is limited and can only take place during the installation phase of ESET products. Furthermore, exploitation can only succeed when Self-Defense is disabled. Affected products are: ESET NOD32 Antivirus, ESET Internet Security, ESET Smart Security, ESET Smart Security Premium versions 13.2 and lower; ESET Endpoint Antivirus, ESET Endpoint Security, ESET NOD32 Antivirus Business Edition, ESET Smart Security Business Edition versions 7.3 and lower; ESET File Security for Microsoft Windows Server, ESET Mail Security for Microsoft Exchange Server, ESET Mail Security for IBM Domino, ESET Security for Kerio, ESET Security for Microsoft SharePoint Server versions 7.2 and lower.

CVSS3: 5.5
fstec
около 5 лет назад

Уязвимость средств антивирусной защиты ESET NOD32 Antivirus, ESET Internet Security, ESET Smart Security, ESET Smart Security Premium, ESET Endpoint Antivirus, ESET Endpoint Security, ESET NOD32 Antivirus Business Edition, ESET Smart Security Business Edition, ESET File Security for Microsoft Windows Server, ESET Mail Security for Microsoft Exchange Server, ESET Mail Security for IBM Domino, ESET Security for Kerio, ESET Security for Microsoft SharePoint Server, связанная с недостатком механизма стандартных разрешений, позволяющая нарушителю перезаписать произвольные файлы

EPSS

Процентиль: 9%
0.00032
Низкий

5.5 Medium

CVSS3

3.6 Low

CVSS2

Дефекты

CWE-276