Логотип exploitDog
bind:CVE-2023-42126
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-42126

Количество 3

Количество 3

nvd логотип

CVE-2023-42126

почти 2 года назад

G DATA Total Security GDBackupSvc Service Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of G Data Total Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the GDBackupSvc service. By creating a symbolic link, an attacker can abuse the service to create a file with a permissive DACL. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-20694.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-rj6w-j3qm-r3rg

почти 2 года назад

G DATA Total Security GDBackupSvc Service Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of G Data Total Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the GDBackupSvc service. By creating a symbolic link, an attacker can abuse the service to create a file with a permissive DACL. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-20694.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2023-06237

больше 2 лет назад

Уязвимость службы GDBackupSvc средства антивирусной защиты G Data Total Security, позволяющий нарушителю повысить свои привилегии или выполнить произвольный код

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-42126

G DATA Total Security GDBackupSvc Service Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of G Data Total Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the GDBackupSvc service. By creating a symbolic link, an attacker can abuse the service to create a file with a permissive DACL. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-20694.

CVSS3: 7.8
0%
Низкий
почти 2 года назад
github логотип
GHSA-rj6w-j3qm-r3rg

G DATA Total Security GDBackupSvc Service Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of G Data Total Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the GDBackupSvc service. By creating a symbolic link, an attacker can abuse the service to create a file with a permissive DACL. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-20694.

CVSS3: 7.8
0%
Низкий
почти 2 года назад
fstec логотип
BDU:2023-06237

Уязвимость службы GDBackupSvc средства антивирусной защиты G Data Total Security, позволяющий нарушителю повысить свои привилегии или выполнить произвольный код

CVSS3: 7.8
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу