Improper check of unusual conditions when launching msiexec.exe in safensec.com (SysWatch service) in SAFE'N'SEC SoftControl/SafenSoft SysWatch, SoftControl/SafenSoft TPSecure, and SoftControl/SafenSoft Enterprise Suite before 4.4.9 allows the local attacker to bypass a code-signing protection mechanism and install/execute an unauthorized program by modifying the system configuration and installing a forged MSI file. (The intended behavior is that the component SysWatch does not allow installation of MSI files unless they are signed by a limited list of certificates.)
References
Link | Resource |
---|---|
http://www.safensoft.com/security.phtml?c=865#SNSVE-2018-3 | Vendor Advisory |
http://www.safensoft.com/security.phtml?c=865#SNSVE-2018-3 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:46
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.safensoft.com/security.phtml?c=865#SNSVE-2018-3 - Vendor Advisory |
Information
Published : 2018-06-29 15:29
Updated : 2024-11-21 03:46
NVD link : CVE-2018-13013
Mitre link : CVE-2018-13013
CVE.ORG link : CVE-2018-13013
JSON object : View
Products Affected
safensoft
- tpsecure
- enterprise_suite
- syswatch
CWE
CWE-754
Improper Check for Unusual or Exceptional Conditions