CVE-2021-3641 – Improper Link Resolution Before File Access in Bitdefender GravityZone (VA-9921)
https://notcve.org/view.php?id=CVE-2021-3641
Improper Link Resolution Before File Access ('Link Following') vulnerability in the EPAG component of Bitdefender Endpoint Security Tools for Windows allows a local attacker to cause a denial of service. This issue affects: Bitdefender GravityZone version 7.1.2.33 and prior versions. Una vulnerabilidad de Resolución de Enlaces Inapropiada versiones anteriores al Acceso a Archivos ("Link Following") en el componente EPAG de Bitdefender Endpoint Security Tools for Windows permite a un atacante local causar una denegación de servicio. Este problema afecta a: Bitdefender GravityZone versión 7.1.2.33 y versiones anteriores This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Bitdefender GravityZone. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Endpoint Agent. • https://www.bitdefender.com/support/security-advisories/improper-link-resolution-before-file-access-in-bitdefender-gravityzone-va-9921 https://www.zerodayinitiative.com/advisories/ZDI-22-143 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •
CVE-2021-3823 – Path traversal vulnerability in Bitdefender GravitZone Update Server in relay mode
https://notcve.org/view.php?id=CVE-2021-3823
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in the UpdateServer component of Bitdefender GravityZone allows an attacker to execute arbitrary code on vulnerable instances. This issue affects: Bitdefender GravityZone versions prior to 3.3.8.249. Una vulnerabilidad de Limitación Inapropiada de un Nombre de Ruta a un Directorio Restringido ("Salto de Ruta") en el componente UpdateServer de Bitdefender GravityZone permite a un atacante ejecutar código arbitrario en instancias vulnerables. Este problema afecta a: Bitdefender GravityZone versiones anteriores a 3.3.8.249 • https://www.bitdefender.com/support/security-advisories/path-traversal-vulnerability-in-bitdefender-gravitzone-update-server-in-relay-mode-va-10039 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2021-3423 – Privilege escalation in Bitdefender GravityZone Business Security
https://notcve.org/view.php?id=CVE-2021-3423
Uncontrolled Search Path Element vulnerability in the openssl component as used in Bitdefender GravityZone Business Security allows an attacker to load a third party DLL to elevate privileges. This issue affects Bitdefender GravityZone Business Security versions prior to 6.6.23.329. Una vulnerabilidad del elemento de ruta de búsqueda no controlada en el componente openssl como es usado en Bitdefender GravityZone Business Security, permite a un atacante cargar una DLL de terceros para escalar privilegios. Este problema afecta a Bitdefender GravityZone Business Security versiones anteriores a 6.6.23.329 • https://www.bitdefender.com/support/security-advisories/privilege-escalation-in-bitdefender-gravityzone-business-security-va-9557 • CWE-427: Uncontrolled Search Path Element •
CVE-2017-8931
https://notcve.org/view.php?id=CVE-2017-8931
Bitdefender GravityZone VMware appliance before 6.2.1-35 might allow attackers to gain access with root privileges via unspecified vectors. Bitdefender GravityZone VMware en versiones anteriores a la 6.2.1-35 podría permitir que los atacantes obtengan acceso con privilegios root mediante vectores sin especificar. • https://www.bitdefender.com/support/bitdefender-gravityzone-6-2-1-35-release-notes-1909.html •
CVE-2018-8955
https://notcve.org/view.php?id=CVE-2018-8955
The installer for BitDefender GravityZone relies on an encoded string in a filename to determine the URL for installation metadata, which allows remote attackers to execute arbitrary code by changing the filename while leaving the file's digital signature unchanged. El instalador de BitDefender GravityZone depende de una cadena cifrada en un nombre de archivo para determinar la URL de metadatos de instalación, lo que permite que atacantes remotos ejecuten código arbitrario cambiando el nombre de archivo y dejando la firma digital del archivo sin cambios. • http://packetstormsecurity.com/files/149900/Bitdefender-GravityZone-Installer-Signature-Bypass-Code-Execution.html http://seclists.org/fulldisclosure/2018/Oct/44 http://www.securitytracker.com/id/1041940 https://labs.nettitude.com/blog/cve-2018-8955-bitdefender-gravityzone-arbitrary-code-execution • CWE-347: Improper Verification of Cryptographic Signature •