Vulnerabilites related to f-secure - internet_security
Vulnerability from fkie_nvd
Published
2009-05-22 20:30
Modified
2024-11-21 01:03
Severity ?
Summary
Multiple F-Secure anti-virus products, including Anti-Virus for Microsoft Exchange 7.10 and earlier; Internet Gatekeeper for Windows 6.61 and earlier, Windows 6.61 and earlier, and Linux 2.16 and earlier; Internet Security 2009 and earlier, Anti-Virus 2009 and earlier, Client Security 8.0 and earlier, and others; allow remote attackers to bypass malware detection via a crafted (1) ZIP and (2) RAR archive.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:anti-virus:*:-:linux_servers:*:*:*:*:*", "matchCriteriaId": "5AE96CC9-08DC-49F0-94C4-89810D8BFE01", "versionEndIncluding": "4.65", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:anti-virus:*:-:inux_client_security:*:*:*:*:*", "matchCriteriaId": "8651DBB2-EC4B-474E-8431-CD7252AC4862", "versionEndIncluding": "5.54", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:anti-virus:*:-:linux_server_security:*:*:*:*:*", "matchCriteriaId": "BD9FDABD-6F42-47E3-8424-559D5DD46EF3", "versionEndIncluding": "5.54", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:anti-virus:*:-:mime_sweeper:*:*:*:*:*", "matchCriteriaId": "2012AC4D-0F75-4389-9165-28930368AE4D", "versionEndIncluding": "5.61", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:anti-virus:*:-:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "AB4ED58A-B715-467B-A463-FB0BA3653FA2", "versionEndIncluding": "6.62", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:anti-virus:*:-:citrix_servers:*:*:*:*:*", "matchCriteriaId": "863CFFAF-FD5B-4150-A063-CB2851D689BF", "versionEndIncluding": "7.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:anti-virus:*:-:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "29A9B0A7-FFB2-460B-8BCB-1C7D9DD55A15", "versionEndIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:anti-virus:*:-:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "EC9E56D7-C642-46FB-8425-A3A7F22B62D2", "versionEndIncluding": "7.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:anti-virus:*:-:windows_server:*:*:*:*:*", "matchCriteriaId": "E829D765-4473-4D6E-AA51-7EC44CB09A2C", "versionEndIncluding": "8.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:anti-virus:*:-:workstations:*:*:*:*:*", "matchCriteriaId": "ECE7F2A4-E673-4B59-BAC2-B3D01AD0E1A9", "versionEndIncluding": "8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:anti-virus:*:*:*:*:*:*:*:*", "matchCriteriaId": "732265B4-ED48-4C91-8C96-4E2A8D0DB105", "versionEndIncluding": "2009", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:client_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B1D2491-0097-40BA-9B35-AA0708A822BC", "versionEndIncluding": "8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:home_server_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "90F7894C-9891-4E09-BE4B-DCA045361D32", "versionEndIncluding": "2009", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:*:-:linux:*:*:*:*:*", "matchCriteriaId": "A0941F91-C6FF-492B-908C-51C46D373BB9", "versionEndIncluding": "2.16", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:*:-:linux_japanese:*:*:*:*:*", "matchCriteriaId": "C8E837C1-A444-4573-8F8E-4488D2917BD4", "versionEndIncluding": "3.01", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:*:-:windows:*:*:*:*:*", "matchCriteriaId": "06B35ABF-C401-4DF4-9935-55E797E60220", "versionEndIncluding": "6.61", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "2ECC7480-20F5-453B-A417-BB2B7BD198E4", "versionEndIncluding": "2009", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:linux_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD234E72-8306-4262-A12A-1B5E18B34E90", "versionEndIncluding": "7.01", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:linux_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "162C76E3-5AB6-4C72-A47A-F2820ED8BF46", "versionEndIncluding": "7.02", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple F-Secure anti-virus products, including Anti-Virus for Microsoft Exchange 7.10 and earlier; Internet Gatekeeper for Windows 6.61 and earlier, Windows 6.61 and earlier, and Linux 2.16 and earlier; Internet Security 2009 and earlier, Anti-Virus 2009 and earlier, Client Security 8.0 and earlier, and others; allow remote attackers to bypass malware detection via a crafted (1) ZIP and (2) RAR archive." }, { "lang": "es", "value": "M\u00faltiples productos antivirus F-Secure, incluidos: Anti-Virus for Microsoft Exchange v7.10 y anteriores; Internet Gatekeeper for Windows v6.61 y anteriores, Windows v6.61 y anteriores, y Linux v2.16 y anteriores; Internet Security 2009 y anteriores, Anti-Virus 2009 y anteriores, Client Security v8.0 y anteriores y otros; permiten a atacantes remotos saltar la detecci\u00f3n de software malicioso mediante archivos (1) .ZIP y (2) .RAR manipulados." } ], "id": "CVE-2009-1782", "lastModified": "2024-11-21T01:03:21.020", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-05-22T20:30:00.877", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/35008" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2009-1.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/34849" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1022170" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1022171" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1022172" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1262" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50346" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/35008" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2009-1.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/34849" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1022170" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1022171" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1022172" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1262" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50346" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-17 21:29
Modified
2024-11-21 04:21
Severity ?
Summary
In the F-Secure installer in F-Secure SAFE for Windows before 17.6, F-Secure Internet Security before 17.6, F-Secure Anti-Virus before 17.6, F-Secure Client Security Standard and Premium before 14.10, F-Secure PSB Workstation Security before 12.01, and F-Secure Computer Protection Standard and Premium before 19.3, a local user can escalate their privileges through a DLL hijacking attack against the installer. The installer writes the file rm.exe to C:\Windows\Temp and then executes it. The rm.exe process then attempts to load several DLLs from its current directory. Non-admin users are able to write to this folder, so an attacker can create a malicious C:\Windows\Temp\OLEACC.dll file. When an admin runs the installer, rm.exe will execute the attacker's DLL in an elevated security context.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://www.f-secure.com/en/web/labs_global/fsc-2019-2 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.f-secure.com/en/web/labs_global/fsc-2019-2 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
f-secure | client_security | * | |
f-secure | client_security | * | |
f-secure | computer_protection | * | |
f-secure | computer_protection | * | |
f-secure | internet_security | * | |
f-secure | psb_workstation_security | * | |
f-secure | safe | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f-secure:client_security:*:*:*:*:premium:*:*:*", "matchCriteriaId": "D3A01148-E184-4D94-B0EA-FA6AC02DA027", "versionEndExcluding": "14.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:client_security:*:*:*:*:standard:*:*:*", "matchCriteriaId": "4B3C0CA2-98CC-463F-BF04-77CB070AAC81", "versionEndExcluding": "14.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:computer_protection:*:*:*:*:premium:*:*:*", "matchCriteriaId": "CB3FBAD7-5965-48E3-994B-97036BB7B0EA", "versionEndExcluding": "19.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:computer_protection:*:*:*:*:standard:*:*:*", "matchCriteriaId": "3B2B925E-6F9C-48D7-9EE4-0D7B47DF2AC5", "versionEndExcluding": "19.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC544B1A-E94E-48A2-835E-4CBAF62B5EED", "versionEndExcluding": "17.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:psb_workstation_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B8BDF27-DCEB-4CD0-9BA8-521FDC12FB02", "versionEndExcluding": "12.01", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:safe:*:*:*:*:*:windows:*:*", "matchCriteriaId": "63FEAA9D-3E79-4F39-9EEF-1B41AF6FFE66", "versionEndExcluding": "17.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the F-Secure installer in F-Secure SAFE for Windows before 17.6, F-Secure Internet Security before 17.6, F-Secure Anti-Virus before 17.6, F-Secure Client Security Standard and Premium before 14.10, F-Secure PSB Workstation Security before 12.01, and F-Secure Computer Protection Standard and Premium before 19.3, a local user can escalate their privileges through a DLL hijacking attack against the installer. The installer writes the file rm.exe to C:\\Windows\\Temp and then executes it. The rm.exe process then attempts to load several DLLs from its current directory. Non-admin users are able to write to this folder, so an attacker can create a malicious C:\\Windows\\Temp\\OLEACC.dll file. When an admin runs the installer, rm.exe will execute the attacker\u0027s DLL in an elevated security context." }, { "lang": "es", "value": "En el instalador de F-Secure en F-Secure SAFE para Windows antes de 17.6, F-Secure Internet Security antes de 17.6, F-Secure Anti-Virus antes de 17.6, F-Secure Client Security Standard y Premium antes de 14.10, F-Secure PSB Workstation Security antes del 12.01, y F-Secure Computer Protection Standard y Premium antes del 19.3, un usuario local puede escalar sus privilegios a trav\u00e9s de un ataque de secuestro de DLL contra el instalador. El instalador escribe el archivo rm.exe en C: \\ Windows \\ Temp y luego lo ejecuta. El proceso rm.exe luego intenta cargar varias DLL desde su directorio actual. Los usuarios que no son administradores pueden escribir en esta carpeta, por lo que un atacante puede crear un archivo malicioso C: \\ Windows \\ Temp \\ OLEACC.dll. Cuando un administrador ejecuta el instalador, rm.exe ejecutar\u00e1 la DLL del atacante en un contexto de seguridad elevado." } ], "id": "CVE-2019-11644", "lastModified": "2024-11-21T04:21:31.240", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-17T21:29:00.293", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/web/labs_global/fsc-2019-2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.f-secure.com/en/web/labs_global/fsc-2019-2" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-427" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2009-1782
Vulnerability from cvelistv5
Published
2009-05-22 20:00
Modified
2024-08-07 05:27
Severity ?
EPSS score ?
Summary
Multiple F-Secure anti-virus products, including Anti-Virus for Microsoft Exchange 7.10 and earlier; Internet Gatekeeper for Windows 6.61 and earlier, Windows 6.61 and earlier, and Linux 2.16 and earlier; Internet Security 2009 and earlier, Anti-Virus 2009 and earlier, Client Security 8.0 and earlier, and others; allow remote attackers to bypass malware detection via a crafted (1) ZIP and (2) RAR archive.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/35008 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id?1022172 | vdb-entry, x_refsource_SECTRACK | |
http://www.vupen.com/english/advisories/2009/1262 | vdb-entry, x_refsource_VUPEN | |
http://www.securitytracker.com/id?1022170 | vdb-entry, x_refsource_SECTRACK | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/50346 | vdb-entry, x_refsource_XF | |
http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2009-1.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/34849 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id?1022171 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:27:54.272Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "35008", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35008" }, { "name": "1022172", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1022172" }, { "name": "ADV-2009-1262", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1262" }, { "name": "1022170", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1022170" }, { "name": "fsecure-rar-zip-security-bypass(50346)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50346" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2009-1.html" }, { "name": "34849", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/34849" }, { "name": "1022171", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1022171" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-05-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple F-Secure anti-virus products, including Anti-Virus for Microsoft Exchange 7.10 and earlier; Internet Gatekeeper for Windows 6.61 and earlier, Windows 6.61 and earlier, and Linux 2.16 and earlier; Internet Security 2009 and earlier, Anti-Virus 2009 and earlier, Client Security 8.0 and earlier, and others; allow remote attackers to bypass malware detection via a crafted (1) ZIP and (2) RAR archive." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "35008", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35008" }, { "name": "1022172", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1022172" }, { "name": "ADV-2009-1262", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1262" }, { "name": "1022170", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1022170" }, { "name": "fsecure-rar-zip-security-bypass(50346)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50346" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2009-1.html" }, { "name": "34849", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/34849" }, { "name": "1022171", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1022171" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-1782", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple F-Secure anti-virus products, including Anti-Virus for Microsoft Exchange 7.10 and earlier; Internet Gatekeeper for Windows 6.61 and earlier, Windows 6.61 and earlier, and Linux 2.16 and earlier; Internet Security 2009 and earlier, Anti-Virus 2009 and earlier, Client Security 8.0 and earlier, and others; allow remote attackers to bypass malware detection via a crafted (1) ZIP and (2) RAR archive." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "35008", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35008" }, { "name": "1022172", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1022172" }, { "name": "ADV-2009-1262", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1262" }, { "name": "1022170", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1022170" }, { "name": "fsecure-rar-zip-security-bypass(50346)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50346" }, { "name": "http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2009-1.html", "refsource": "CONFIRM", "url": "http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2009-1.html" }, { "name": "34849", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34849" }, { "name": "1022171", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1022171" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-1782", "datePublished": "2009-05-22T20:00:00", "dateReserved": "2009-05-22T00:00:00", "dateUpdated": "2024-08-07T05:27:54.272Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-11644
Vulnerability from cvelistv5
Published
2019-05-17 20:05
Modified
2024-08-04 23:03
Severity ?
EPSS score ?
Summary
In the F-Secure installer in F-Secure SAFE for Windows before 17.6, F-Secure Internet Security before 17.6, F-Secure Anti-Virus before 17.6, F-Secure Client Security Standard and Premium before 14.10, F-Secure PSB Workstation Security before 12.01, and F-Secure Computer Protection Standard and Premium before 19.3, a local user can escalate their privileges through a DLL hijacking attack against the installer. The installer writes the file rm.exe to C:\Windows\Temp and then executes it. The rm.exe process then attempts to load several DLLs from its current directory. Non-admin users are able to write to this folder, so an attacker can create a malicious C:\Windows\Temp\OLEACC.dll file. When an admin runs the installer, rm.exe will execute the attacker's DLL in an elevated security context.
References
▼ | URL | Tags |
---|---|---|
https://www.f-secure.com/en/web/labs_global/fsc-2019-2 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:03:31.139Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.f-secure.com/en/web/labs_global/fsc-2019-2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-05-16T00:00:00", "descriptions": [ { "lang": "en", "value": "In the F-Secure installer in F-Secure SAFE for Windows before 17.6, F-Secure Internet Security before 17.6, F-Secure Anti-Virus before 17.6, F-Secure Client Security Standard and Premium before 14.10, F-Secure PSB Workstation Security before 12.01, and F-Secure Computer Protection Standard and Premium before 19.3, a local user can escalate their privileges through a DLL hijacking attack against the installer. The installer writes the file rm.exe to C:\\Windows\\Temp and then executes it. The rm.exe process then attempts to load several DLLs from its current directory. Non-admin users are able to write to this folder, so an attacker can create a malicious C:\\Windows\\Temp\\OLEACC.dll file. When an admin runs the installer, rm.exe will execute the attacker\u0027s DLL in an elevated security context." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-17T20:05:35", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.f-secure.com/en/web/labs_global/fsc-2019-2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-11644", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In the F-Secure installer in F-Secure SAFE for Windows before 17.6, F-Secure Internet Security before 17.6, F-Secure Anti-Virus before 17.6, F-Secure Client Security Standard and Premium before 14.10, F-Secure PSB Workstation Security before 12.01, and F-Secure Computer Protection Standard and Premium before 19.3, a local user can escalate their privileges through a DLL hijacking attack against the installer. The installer writes the file rm.exe to C:\\Windows\\Temp and then executes it. The rm.exe process then attempts to load several DLLs from its current directory. Non-admin users are able to write to this folder, so an attacker can create a malicious C:\\Windows\\Temp\\OLEACC.dll file. When an admin runs the installer, rm.exe will execute the attacker\u0027s DLL in an elevated security context." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.f-secure.com/en/web/labs_global/fsc-2019-2", "refsource": "CONFIRM", "url": "https://www.f-secure.com/en/web/labs_global/fsc-2019-2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-11644", "datePublished": "2019-05-17T20:05:35", "dateReserved": "2019-05-01T00:00:00", "dateUpdated": "2024-08-04T23:03:31.139Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }