A weak malicious user can escalate its privilege whenever CatalystProductionSuite.2019.1.exe (version 1.1.0.21) and CatalystBrowseSuite.2019.1.exe (version 1.1.0.21) installers run. The vulnerability is in the form of DLL Hijacking. The installers try to load DLLs that don’t exist from its current directory; by doing so, an attacker can quickly escalate its privileges.
References
Link | Resource |
---|---|
https://gist.github.com/Eli-Paz/482b514320009f3e76ea712cde3bc350 | Exploit Third Party Advisory |
https://gist.github.com/Eli-Paz/482b514320009f3e76ea712cde3bc350 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:34
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/Eli-Paz/482b514320009f3e76ea712cde3bc350 - Exploit, Third Party Advisory |
Information
Published : 2019-12-04 19:15
Updated : 2024-11-21 04:34
NVD link : CVE-2019-19364
Mitre link : CVE-2019-19364
CVE.ORG link : CVE-2019-19364
JSON object : View
Products Affected
sony
- catalyst_production_suite
- catalyst_browse
CWE
CWE-427
Uncontrolled Search Path Element