Логотип exploitDog
bind:CVE-2023-42125
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-42125

Количество 3

Количество 3

nvd логотип

CVE-2023-42125

почти 2 года назад

Avast Premium Security Sandbox Protection Link Following Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Avast Premium Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the implementation of the sandbox feature. By creating a symbolic link, an attacker can abuse the service to create arbitrary namespace objects. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. . Was ZDI-CAN-20383.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-665q-2m8r-wpx6

почти 2 года назад

Avast Premium Security Sandbox Protection Link Following Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Avast Premium Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the implementation of the sandbox feature. By creating a symbolic link, an attacker can abuse the service to create arbitrary namespace objects. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-20383.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2023-07187

больше 2 лет назад

Уязвимость средства антивирусной защиты Avast Premium Security, связанная с недостатками разграничения доступа изолированной среды, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-42125

Avast Premium Security Sandbox Protection Link Following Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Avast Premium Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the implementation of the sandbox feature. By creating a symbolic link, an attacker can abuse the service to create arbitrary namespace objects. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. . Was ZDI-CAN-20383.

CVSS3: 7.8
0%
Низкий
почти 2 года назад
github логотип
GHSA-665q-2m8r-wpx6

Avast Premium Security Sandbox Protection Link Following Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Avast Premium Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the implementation of the sandbox feature. By creating a symbolic link, an attacker can abuse the service to create arbitrary namespace objects. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-20383.

CVSS3: 7.8
0%
Низкий
почти 2 года назад
fstec логотип
BDU:2023-07187

Уязвимость средства антивирусной защиты Avast Premium Security, связанная с недостатками разграничения доступа изолированной среды, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код

CVSS3: 7.8
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу