plays_service.exe in the plays.tv service before 1.27.7.0, as distributed in AMD driver-installation packages and Gaming Evolved products, executes code at a user-defined (local or SMB) path as SYSTEM when the execute_installer parameter is used in an HTTP message. This occurs without properly authenticating the user.
References
Link | Resource |
---|---|
https://github.com/securifera/CVE-2018-6546-Exploit/ | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/44476/ | Exploit Third Party Advisory VDB Entry |
https://www.securifera.com/advisories/CVE-2018-6546/ | Third Party Advisory |
https://github.com/securifera/CVE-2018-6546-Exploit/ | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/44476/ | Exploit Third Party Advisory VDB Entry |
https://www.securifera.com/advisories/CVE-2018-6546/ | Third Party Advisory |
Configurations
History
21 Nov 2024, 04:10
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/securifera/CVE-2018-6546-Exploit/ - Exploit, Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/44476/ - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.securifera.com/advisories/CVE-2018-6546/ - Third Party Advisory |
Information
Published : 2018-04-13 16:29
Updated : 2024-11-21 04:10
NVD link : CVE-2018-6546
Mitre link : CVE-2018-6546
CVE.ORG link : CVE-2018-6546
JSON object : View
Products Affected
plays.tv
- plays.tv
CWE
CWE-287
Improper Authentication