Druide Antidote RX, HD, 8 before 8.05.2287, 9 before 9.5.3937 and 10 before 10.1.2147 allows remote attackers to steal NTLM hashes or perform SMB relay attacks upon a direct launch of the product, or upon an indirect launch via an integration such as Chrome, Firefox, Word, Outlook, etc. This occurs because the product attempts to access a share with the PLUG-INS subdomain name; an attacker may be able to use Active Directory Domain Services to register that name.
References
Link | Resource |
---|---|
https://gosecure.net/2019/02/20/abusing-unsafe-defaults-in-active-directory/ | Exploit Third Party Advisory |
https://www.druide.com/en/news/security-improvement-antidote-windows | Vendor Advisory |
https://gosecure.net/2019/02/20/abusing-unsafe-defaults-in-active-directory/ | Exploit Third Party Advisory |
https://www.druide.com/en/news/security-improvement-antidote-windows | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://gosecure.net/2019/02/20/abusing-unsafe-defaults-in-active-directory/ - Exploit, Third Party Advisory | |
References | () https://www.druide.com/en/news/security-improvement-antidote-windows - Vendor Advisory |
Information
Published : 2019-03-04 08:29
Updated : 2024-11-21 04:51
NVD link : CVE-2019-9565
Mitre link : CVE-2019-9565
CVE.ORG link : CVE-2019-9565
JSON object : View
Products Affected
druide
- antidote
CWE