Unsafe usage of .NET deserialization in Named Pipe message processing allows privilege escalation to NT AUTHORITY\SYSTEM for a local attacker. Affected product is TinyWall, all versions up to and including 2.1.12. Fixed in version 2.1.13.
References
Link | Resource |
---|---|
https://gist.github.com/pylorak/7df52c9325614676e07782dbe4e81582 | Third Party Advisory |
https://www.wilderssecurity.com/threads/beta-testing-tinywall.309739/page-62#post-2882843 | Third Party Advisory |
https://gist.github.com/pylorak/7df52c9325614676e07782dbe4e81582 | Third Party Advisory |
https://www.wilderssecurity.com/threads/beta-testing-tinywall.309739/page-62#post-2882843 | Third Party Advisory |
Configurations
History
21 Nov 2024, 04:34
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/pylorak/7df52c9325614676e07782dbe4e81582 - Third Party Advisory | |
References | () https://www.wilderssecurity.com/threads/beta-testing-tinywall.309739/page-62#post-2882843 - Third Party Advisory |
Information
Published : 2019-12-30 18:15
Updated : 2024-11-21 04:34
NVD link : CVE-2019-19470
Mitre link : CVE-2019-19470
CVE.ORG link : CVE-2019-19470
JSON object : View
Products Affected
tinywall
- tinywall
CWE
CWE-502
Deserialization of Untrusted Data