A local privilege escalation is caused by Overwolf
loading and executing certain dynamic link library files from a user-writeable
folder in SYSTEM context on launch. This allows an attacker with unprivileged
access to the system to run arbitrary code with SYSTEM privileges by placing a
malicious .dll file in the respective location.
References
Link | Resource |
---|---|
https://www.cirosec.de/sa/sa-2024-004 | Third Party Advisory |
Configurations
History
05 Sep 2024, 17:52
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:overwolf:overwolf:*:*:*:*:*:*:*:* | |
First Time |
Overwolf
Overwolf overwolf |
|
References | () https://www.cirosec.de/sa/sa-2024-004 - Third Party Advisory | |
Summary |
|
04 Sep 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-04 13:15
Updated : 2024-09-05 17:52
NVD link : CVE-2024-7834
Mitre link : CVE-2024-7834
CVE.ORG link : CVE-2024-7834
JSON object : View
Products Affected
overwolf
- overwolf
CWE
CWE-427
Uncontrolled Search Path Element