The VPN component in Windscribe 1.81 uses the OpenVPN client for connections. Also, it creates a WindScribeService.exe system process that establishes a \\.\pipe\WindscribeService named pipe endpoint that allows the Windscribe VPN process to connect and execute an OpenVPN process or other processes (like taskkill, etc.). There is no validation of the program name before constructing the lpCommandLine argument for a CreateProcess call. An attacker can run any malicious process with SYSTEM privileges through this named pipe.
References
Configurations
History
21 Nov 2024, 03:43
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/156222/Windscribe-WindscribeService-Named-Pipe-Privilege-Escalation.html - | |
References | () http://sqlulz.blogspot.com/2018/05/windscribe-vpn-privilege-escalation.html - Third Party Advisory |
Information
Published : 2018-05-25 19:29
Updated : 2024-11-21 03:43
NVD link : CVE-2018-11479
Mitre link : CVE-2018-11479
CVE.ORG link : CVE-2018-11479
JSON object : View
Products Affected
windscribe
- windscribe
CWE
CWE-20
Improper Input Validation