On Windows, the uninstaller binary copies itself to a fixed temporary location, which is then executed (the originally called uninstaller exits, so it does not block the installation directory). This temporary location is not randomized and does not restrict access to Administrators only so a potential attacker could plant a binary to replace the copied binary right before it gets called, thus gaining Administrator privileges (if the original uninstaller was executed as Administrator). The vulnerability only affects Windows installers.
References
Link | Resource |
---|---|
https://blog.installbuilder.com/2021/10/installbuilder-2160-released.html | Release Notes Vendor Advisory |
https://blog.installbuilder.com/2021/10/installbuilder-2160-released.html | Release Notes Vendor Advisory |
Configurations
History
21 Nov 2024, 05:49
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.installbuilder.com/2021/10/installbuilder-2160-released.html - Release Notes, Vendor Advisory |
Information
Published : 2021-10-29 12:15
Updated : 2024-11-21 05:49
NVD link : CVE-2021-22038
Mitre link : CVE-2021-22038
CVE.ORG link : CVE-2021-22038
JSON object : View
Products Affected
vmware
- installbuilder
CWE
CWE-330
Use of Insufficiently Random Values