Page 2 of 8 results (0.001 seconds)

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 2

In Valve Steam Client for Windows through 2019-08-07, HKLM\SOFTWARE\Wow6432Node\Valve\Steam has explicit "Full control" for the Users group, which allows local users to gain NT AUTHORITY\SYSTEM access. En Valve Steam Client para Windows hasta 2019-08-07, HKLM-SOFTWARE-Wow6432Node-Valve-Steam tiene explícitos "Control completo" para el grupo Usuarios, lo que permite a los usuarios locales obtener acceso NT AUTHORITY-SYSTEM. • https://amonitoring.ru/article/steamclient-0day https://github.com/alexanderbittner/steam-privesc https://habr.com/ru/company/pm/blog/462479 • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

Valve Steam 2.10.91.91 uses weak permissions (Users: read and write) for the Install folder, which allows local users to gain privileges via a Trojan horse steam.exe file. Valve Steam 2.10.91.91 utiliza permisos débiles (Usuarios: leer y escribir) para la carpeta Install, lo que permite a usuarios locales obtener privilegios a través de un archivo troyano steam.exe . • https://www.exploit-db.com/exploits/9386 http://packetstormsecurity.com/files/134513/Steam-2.10.91.91-Weak-File-Permissions-Privilege-Escalation.html http://www.securityfocus.com/archive/1/536961/100/0/threaded • CWE-276: Incorrect Default Permissions •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

The client detection protocol in Valve Steam allows remote attackers to cause a denial of service (process crash) via a crafted response to a broadcast packet. El protocolo de detección de clientes en Valve Steam permite a atacantes remotos causar una denegación de servicio (caída de proceso) a través de una respuesta manipulada a un paquete de difusión. This vulnerability allows remote attackers to execute a denial of service attack on vulnerable installations of Valve Steam. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Steam client detection protocol. By responding to a broadcast packet with a crafted response, an attacker can cause the Steam process to crash. • http://store.steampowered.com/news/16801 http://www.securityfocus.com/bid/74735 http://www.zerodayinitiative.com/advisories/ZDI-15-233 • CWE-20: Improper Input Validation •