CVE-2019-6534

The uncontrolled search path element vulnerability in Gemalto Sentinel UltraPro Client Library ux32w.dll Versions 1.3.0, 1.3.1, and 1.3.2 enables an attacker to load and execute a malicious file.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gemalto:sentinel_ultrapro_client_library:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:gemalto:sentinel_ultrapro_client_library:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:gemalto:sentinel_ultrapro_client_library:1.3.2:*:*:*:*:*:*:*

History

21 Nov 2024, 04:46

Type Values Removed Values Added
References () https://ics-cert.us-cert.gov/advisories/ICSA-19-073-02 - US Government Resource, Third Party Advisory () https://ics-cert.us-cert.gov/advisories/ICSA-19-073-02 - Third Party Advisory, US Government Resource
References () https://ics-cert.us-cert.gov/advisories/ICSA-19-078-01 - US Government Resource, Third Party Advisory () https://ics-cert.us-cert.gov/advisories/ICSA-19-078-01 - Third Party Advisory, US Government Resource
References () https://supportportal.gemalto.com/csm?id=kb_article_view&sysparm_article=KB0017694 - Release Notes, Vendor Advisory () https://supportportal.gemalto.com/csm?id=kb_article_view&sysparm_article=KB0017694 - Release Notes, Vendor Advisory
References () https://sw.aveva.com/hubfs/assets-2018/pdf/security-bulletin/SecurityBulletin_LFSec131.pdf - Patch, Third Party Advisory () https://sw.aveva.com/hubfs/assets-2018/pdf/security-bulletin/SecurityBulletin_LFSec131.pdf - Patch, Third Party Advisory

Information

Published : 2019-04-11 21:29

Updated : 2024-11-21 04:46


NVD link : CVE-2019-6534

Mitre link : CVE-2019-6534

CVE.ORG link : CVE-2019-6534


JSON object : View

Products Affected

gemalto

  • sentinel_ultrapro_client_library
CWE
CWE-427

Uncontrolled Search Path Element