DLL hijacking is possible in Sublime Text 3 version 3.1.1 build 3176 on 32-bit Windows platforms because a Trojan horse api-ms-win-core-fibers-l1-1-1.dll or api-ms-win-core-localization-l1-2-1.dll file may be loaded if a victim uses sublime_text.exe to open a .txt file within an attacker's %LOCALAPPDATA%\Temp\sublime_text folder. NOTE: the vendor's position is "This does not appear to be a bug with Sublime Text, but rather one with Windows that has been patched.
References
Link | Resource |
---|---|
https://github.com/SublimeTextIssues/Core/issues/2544 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
07 Nov 2023, 03:13
Type | Values Removed | Values Added |
---|---|---|
Summary | DLL hijacking is possible in Sublime Text 3 version 3.1.1 build 3176 on 32-bit Windows platforms because a Trojan horse api-ms-win-core-fibers-l1-1-1.dll or api-ms-win-core-localization-l1-2-1.dll file may be loaded if a victim uses sublime_text.exe to open a .txt file within an attacker's %LOCALAPPDATA%\Temp\sublime_text folder. NOTE: the vendor's position is "This does not appear to be a bug with Sublime Text, but rather one with Windows that has been patched. |
Information
Published : 2019-02-25 07:29
Updated : 2024-08-04 22:15
NVD link : CVE-2019-9116
Mitre link : CVE-2019-9116
CVE.ORG link : CVE-2019-9116
JSON object : View
Products Affected
sublimetext
- sublime_text_3
microsoft
- windows_7
CWE
CWE-427
Uncontrolled Search Path Element