Show plain JSON{"id": "CVE-2019-11644", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 1.8}]}, "published": "2019-05-17T21:29:00.293", "references": [{"url": "https://www.f-secure.com/en/web/labs_global/fsc-2019-2", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://www.f-secure.com/en/web/labs_global/fsc-2019-2", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-427"}]}], "descriptions": [{"lang": "en", "value": "In the F-Secure installer in F-Secure SAFE for Windows before 17.6, F-Secure Internet Security before 17.6, F-Secure Anti-Virus before 17.6, F-Secure Client Security Standard and Premium before 14.10, F-Secure PSB Workstation Security before 12.01, and F-Secure Computer Protection Standard and Premium before 19.3, a local user can escalate their privileges through a DLL hijacking attack against the installer. The installer writes the file rm.exe to C:\\Windows\\Temp and then executes it. The rm.exe process then attempts to load several DLLs from its current directory. Non-admin users are able to write to this folder, so an attacker can create a malicious C:\\Windows\\Temp\\OLEACC.dll file. When an admin runs the installer, rm.exe will execute the attacker's DLL in an elevated security context."}, {"lang": "es", "value": "En el instalador de F-Secure en F-Secure SAFE para Windows antes de 17.6, F-Secure Internet Security antes de 17.6, F-Secure Anti-Virus antes de 17.6, F-Secure Client Security Standard y Premium antes de 14.10, F-Secure PSB Workstation Security antes del 12.01, y F-Secure Computer Protection Standard y Premium antes del 19.3, un usuario local puede escalar sus privilegios a trav\u00e9s de un ataque de secuestro de DLL contra el instalador. El instalador escribe el archivo rm.exe en C: \\ Windows \\ Temp y luego lo ejecuta. El proceso rm.exe luego intenta cargar varias DLL desde su directorio actual. Los usuarios que no son administradores pueden escribir en esta carpeta, por lo que un atacante puede crear un archivo malicioso C: \\ Windows \\ Temp \\ OLEACC.dll. Cuando un administrador ejecuta el instalador, rm.exe ejecutar\u00e1 la DLL del atacante en un contexto de seguridad elevado."}], "lastModified": "2024-11-21T04:21:31.240", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:f-secure:client_security:*:*:*:*:premium:*:*:*", "vulnerable": true, "matchCriteriaId": "D3A01148-E184-4D94-B0EA-FA6AC02DA027", "versionEndExcluding": "14.10"}, {"criteria": "cpe:2.3:a:f-secure:client_security:*:*:*:*:standard:*:*:*", "vulnerable": true, "matchCriteriaId": "4B3C0CA2-98CC-463F-BF04-77CB070AAC81", "versionEndExcluding": "14.10"}, {"criteria": "cpe:2.3:a:f-secure:computer_protection:*:*:*:*:premium:*:*:*", "vulnerable": true, "matchCriteriaId": "CB3FBAD7-5965-48E3-994B-97036BB7B0EA", "versionEndExcluding": "19.3"}, {"criteria": "cpe:2.3:a:f-secure:computer_protection:*:*:*:*:standard:*:*:*", "vulnerable": true, "matchCriteriaId": "3B2B925E-6F9C-48D7-9EE4-0D7B47DF2AC5", "versionEndExcluding": "19.3"}, {"criteria": "cpe:2.3:a:f-secure:internet_security:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AC544B1A-E94E-48A2-835E-4CBAF62B5EED", "versionEndExcluding": "17.6"}, {"criteria": "cpe:2.3:a:f-secure:psb_workstation_security:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B8BDF27-DCEB-4CD0-9BA8-521FDC12FB02", "versionEndExcluding": "12.01"}, {"criteria": "cpe:2.3:a:f-secure:safe:*:*:*:*:*:windows:*:*", "vulnerable": true, "matchCriteriaId": "63FEAA9D-3E79-4F39-9EEF-1B41AF6FFE66", "versionEndExcluding": "17.6"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}