Untrusted search path vulnerability in the installer for TrueCrypt 7.2 and 7.1a, VeraCrypt before 1.17-BETA, and possibly other products allows local users to execute arbitrary code with administrator privileges and conduct DLL hijacking attacks via a Trojan horse DLL in the "application directory", as demonstrated with the USP10.dll, RichEd20.dll, NTMarta.dll and SRClient.dll DLLs.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2016/Jan/22 | Exploit Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/01/11/1 | Patch Third Party Advisory |
http://seclists.org/fulldisclosure/2016/Jan/22 | Exploit Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/01/11/1 | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:46
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2016/Jan/22 - Exploit, Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2016/01/11/1 - Patch, Third Party Advisory |
Information
Published : 2017-01-23 21:59
Updated : 2024-11-21 02:46
NVD link : CVE-2016-1281
Mitre link : CVE-2016-1281
CVE.ORG link : CVE-2016-1281
JSON object : View
Products Affected
idrix
- truecrypt
- veracrypt
CWE
CWE-426
Untrusted Search Path