CVE-2019-19470

Unsafe usage of .NET deserialization in Named Pipe message processing allows privilege escalation to NT AUTHORITY\SYSTEM for a local attacker. Affected product is TinyWall, all versions up to and including 2.1.12. Fixed in version 2.1.13.
Configurations

Configuration 1 (hide)

cpe:2.3:a:tinywall:tinywall:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:34

Type Values Removed Values Added
References () https://gist.github.com/pylorak/7df52c9325614676e07782dbe4e81582 - Third Party Advisory () https://gist.github.com/pylorak/7df52c9325614676e07782dbe4e81582 - Third Party Advisory
References () https://www.wilderssecurity.com/threads/beta-testing-tinywall.309739/page-62#post-2882843 - Third Party Advisory () https://www.wilderssecurity.com/threads/beta-testing-tinywall.309739/page-62#post-2882843 - Third Party Advisory

Information

Published : 2019-12-30 18:15

Updated : 2024-11-21 04:34


NVD link : CVE-2019-19470

Mitre link : CVE-2019-19470

CVE.ORG link : CVE-2019-19470


JSON object : View

Products Affected

tinywall

  • tinywall
CWE
CWE-502

Deserialization of Untrusted Data