CVE-2018-6623

An issue was discovered in Hola 1.79.859. An unprivileged user could modify or overwrite the executable with arbitrary code, which would be executed the next time the service is started. Depending on the user that the service runs as, this could result in privilege escalation. The issue exists because of the SERVICE_ALL_ACCESS access right for the hola_svc and hola_updater services.
References
Link Resource
http://seclists.org/fulldisclosure/2018/Mar/23 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2018/Mar/23 Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:hola:vpn:1.79.859:*:*:*:*:*:*:*

History

21 Nov 2024, 04:11

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2018/Mar/23 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2018/Mar/23 - Mailing List, Third Party Advisory

Information

Published : 2018-03-12 21:29

Updated : 2024-11-21 04:11


NVD link : CVE-2018-6623

Mitre link : CVE-2018-6623

CVE.ORG link : CVE-2018-6623


JSON object : View

Products Affected

hola

  • vpn
CWE
CWE-732

Incorrect Permission Assignment for Critical Resource