Vulnerabilites related to ESET - ESET Smart Security
jvndb-2018-000083
Vulnerability from jvndb
Published
2018-07-24 14:43
Modified
2019-07-26 12:05
Severity ?
Summary
The installers of multiple Canon IT Solutions Inc. software programs may insecurely load Dynamic Link Libraries
Details
The installers of multiple software programs provided by Canon IT Solutions Inc. contain an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries (CWE-427).
Yuji Tounai of NTT Communications Corporation reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
Impacted products
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2018/JVNDB-2018-000083.html", "dc:date": "2019-07-26T12:05+09:00", "dcterms:issued": "2018-07-24T14:43+09:00", "dcterms:modified": "2019-07-26T12:05+09:00", "description": "The installers of multiple software programs provided by Canon IT Solutions Inc. contain an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries (CWE-427).\r\n\r\nYuji Tounai of NTT Communications Corporation reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2018/JVNDB-2018-000083.html", "sec:cpe": [ { "#text": "cpe:/a:eset:compusec", "@product": "CompuSec", "@vendor": "ESET", "@version": "2.2" }, { "#text": "cpe:/a:eset:deslock%2b_pro", "@product": "DESlock+ Pro", "@vendor": "ESET", "@version": "2.2" }, { "#text": "cpe:/a:eset:internet_security", "@product": "ESET Internet Security", "@vendor": "ESET", "@version": "2.2" }, { "#text": "cpe:/a:eset:nod32_antivirus", "@product": "ESET NOD32 Antivirus", "@vendor": "ESET", "@version": "2.2" }, { "#text": "cpe:/a:eset:smart_security", "@product": "ESET Smart Security", "@vendor": "ESET", "@version": "2.2" }, { "#text": "cpe:/a:eset:smart_security_premium", "@product": "ESET Smart Security Premium", "@vendor": "ESET", "@version": "2.2" } ], "sec:cvss": [ { "@score": "6.8", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "@version": "2.0" }, { "@score": "7.8", "@severity": "High", "@type": "Base", "@vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "@version": "3.0" } ], "sec:identifier": "JVNDB-2018-000083", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN41452671/index.html", "@id": "JVN#41452671", "@source": "JVN" }, { "#text": "https://jvn.jp/en/ta/JVNTA91240916/", "@id": "JVNTA#91240916", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0649", "@id": "CVE-2018-0649", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2018-0649", "@id": "CVE-2018-0649", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-Other", "@title": "No Mapping(CWE-Other)" } ], "title": "The installers of multiple Canon IT Solutions Inc. software programs may insecurely load Dynamic Link Libraries" }
cve-2021-37852
Vulnerability from cvelistv5
Published
2022-02-09 05:14
Modified
2024-09-16 23:02
Severity ?
EPSS score ?
Summary
ESET products for Windows allows untrusted process to impersonate the client of a pipe, which can be leveraged by attacker to escalate privileges in the context of NT AUTHORITY\SYSTEM.
References
▼ | URL | Tags |
---|---|---|
https://support.eset.com/en/ca8223-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-22-148/ | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | ESET | ESET NOD32 Antivirus |
Version: 10.0.337.1 < |
|||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:30:09.085Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.eset.com/en/ca8223-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-148/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ESET NOD32 Antivirus", "vendor": "ESET", "versions": [ { "lessThanOrEqual": "15.0.18.0", "status": "affected", "version": "10.0.337.1", "versionType": "custom" } ] }, { "product": "ESET Internet Security", "vendor": "ESET", "versions": [ { "lessThanOrEqual": "15.0.18.0", "status": "affected", "version": "10.0.337.1", "versionType": "custom" } ] }, { "product": "ESET Smart Security", "vendor": "ESET", "versions": [ { "lessThanOrEqual": "15.0.18.0", "status": "affected", "version": "10.0.337.1", "versionType": "custom" } ] }, { "product": "ESET Endpoint Antivirus for Windows", "vendor": "ESET", "versions": [ { "lessThanOrEqual": "9.0.2032.4", "status": "affected", "version": "6.6.2046.0", "versionType": "custom" } ] }, { "product": "ESET Endpoint Security for Windows", "vendor": "ESET", "versions": [ { "lessThanOrEqual": "9.0.2032.4", "status": "affected", "version": "6.6.2046.0", "versionType": "custom" } ] }, { "product": "ESET Server Security for Microsoft Windows Server", "vendor": "ESET", "versions": [ { "lessThanOrEqual": "8.0.12003.1", "status": "affected", "version": "8.0.12003.0", "versionType": "custom" } ] }, { "product": "ESET File Security for Microsoft Windows Server", "vendor": "ESET", "versions": [ { "lessThanOrEqual": "7.3.12006.0", "status": "affected", "version": "7.0.12014.0", "versionType": "custom" } ] }, { "product": "ESET Server Security for Microsoft Azure", "vendor": "ESET", "versions": [ { "lessThanOrEqual": "7.2.12004.1000", "status": "affected", "version": "7.0.12016.1002", "versionType": "custom" } ] }, { "product": "ESET Security for Microsoft SharePoint Server", "vendor": "ESET", "versions": [ { "lessThanOrEqual": "8.0.15004.0", "status": "affected", "version": "7.0.15008.0", "versionType": "custom" } ] }, { "product": "ESET Mail Security for IBM Domino", "vendor": "ESET", "versions": [ { "lessThanOrEqual": "8.0.14004.0", "status": "affected", "version": "7.0.14008.0", "versionType": "custom" } ] }, { "product": "ESET Mail Security for Microsoft Exchange Server", "vendor": "ESET", "versions": [ { "lessThanOrEqual": "8.0.10016.0", "status": "affected", "version": "7.0.10019", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Michael DePlante (@izobashi) of Trend Micro\u0027s Zero Day Initiative" } ], "datePublic": "2022-01-31T00:00:00", "descriptions": [ { "lang": "en", "value": "ESET products for Windows allows untrusted process to impersonate the client of a pipe, which can be leveraged by attacker to escalate privileges in the context of NT AUTHORITY\\SYSTEM." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Privilege Escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-09T05:14:13", "orgId": "4a9b9929-2450-4021-b7b9-469a0255b215", "shortName": "ESET" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.eset.com/en/ca8223-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-148/" } ], "source": { "advisory": "CA8223", "discovery": "EXTERNAL" }, "title": "LPE in ESET products for Windows", "workarounds": [ { "lang": "en", "value": "The attack surface can also be eliminated by disabling the Enable advanced scanning via AMSI option in ESET products\u00e2\u20ac\u2122 Advanced setup.\n\nHowever, ESET strongly recommends performing an upgrade to a fixed product version and only applying this workaround when the upgrade is not possible for an important reason." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@eset.com", "DATE_PUBLIC": "2022-01-31T09:00:00.000Z", "ID": "CVE-2021-37852", "STATE": "PUBLIC", "TITLE": "LPE in ESET products for Windows" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ESET NOD32 Antivirus", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "10.0.337.1", "version_value": "15.0.18.0" } ] } }, { "product_name": "ESET Internet Security", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "10.0.337.1", "version_value": "15.0.18.0" } ] } }, { "product_name": "ESET Smart Security", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "10.0.337.1", "version_value": "15.0.18.0" } ] } }, { "product_name": "ESET Endpoint Antivirus for Windows", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "6.6.2046.0", "version_value": "9.0.2032.4" } ] } }, { "product_name": "ESET Endpoint Security for Windows", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "6.6.2046.0", "version_value": "9.0.2032.4" } ] } }, { "product_name": "ESET Server Security for Microsoft Windows Server", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "8.0.12003.0", "version_value": "8.0.12003.1" } ] } }, { "product_name": "ESET File Security for Microsoft Windows Server", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "7.0.12014.0", "version_value": "7.3.12006.0" } ] } }, { "product_name": "ESET Server Security for Microsoft Azure", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "7.0.12016.1002", "version_value": "7.2.12004.1000" } ] } }, { "product_name": "ESET Security for Microsoft SharePoint Server", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "7.0.15008.0", "version_value": "8.0.15004.0" } ] } }, { "product_name": "ESET Mail Security for IBM Domino", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "7.0.14008.0", "version_value": "8.0.14004.0" } ] } }, { "product_name": "ESET Mail Security for Microsoft Exchange Server", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "7.0.10019", "version_value": "8.0.10016.0" } ] } } ] }, "vendor_name": "ESET" } ] } }, "credit": [ { "lang": "eng", "value": "Michael DePlante (@izobashi) of Trend Micro\u0027s Zero Day Initiative" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ESET products for Windows allows untrusted process to impersonate the client of a pipe, which can be leveraged by attacker to escalate privileges in the context of NT AUTHORITY\\SYSTEM." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Privilege Escalation" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.eset.com/en/ca8223-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows", "refsource": "MISC", "url": "https://support.eset.com/en/ca8223-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-148/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-148/" } ] }, "source": { "advisory": "CA8223", "discovery": "EXTERNAL" }, "work_around": [ { "lang": "en", "value": "The attack surface can also be eliminated by disabling the Enable advanced scanning via AMSI option in ESET products\u00e2\u20ac\u2122 Advanced setup.\n\nHowever, ESET strongly recommends performing an upgrade to a fixed product version and only applying this workaround when the upgrade is not possible for an important reason." } ] } } }, "cveMetadata": { "assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215", "assignerShortName": "ESET", "cveId": "CVE-2021-37852", "datePublished": "2022-02-09T05:14:13.627605Z", "dateReserved": "2021-08-02T00:00:00", "dateUpdated": "2024-09-16T23:02:00.516Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }