Page 5 of 29 results (0.005 seconds)

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 2

In Valve Steam Client for Windows through 2019-08-07, HKLM\SOFTWARE\Wow6432Node\Valve\Steam has explicit "Full control" for the Users group, which allows local users to gain NT AUTHORITY\SYSTEM access. En Valve Steam Client para Windows hasta 2019-08-07, HKLM-SOFTWARE-Wow6432Node-Valve-Steam tiene explícitos "Control completo" para el grupo Usuarios, lo que permite a los usuarios locales obtener acceso NT AUTHORITY-SYSTEM. • https://amonitoring.ru/article/steamclient-0day https://github.com/alexanderbittner/steam-privesc https://habr.com/ru/company/pm/blog/462479 • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 5.8EPSS: 0%CPEs: 1EXPL: 0

In Valve Steam 1528829181 BETA, it is possible to perform a homograph / homoglyph attack to create fake URLs in the client, which may trick users into visiting unintended web sites. En Valve Steam 1528829181 BETA, es posible realizar un ataque de homograph / homoglyph para crear URL falsas en el cliente, que pueden engañar a los usuarios para que visiten sitios web no deseados. • https://github.com/VixusFoxy/CVE/wiki/CVE-2018-12270 • CWE-20: Improper Input Validation •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

An issue was discovered in Valve Steam Link build 643. When the SSH daemon is enabled for local development, the device is publicly available via IPv6 TCP port 22 over the internet (with stateless address autoconfiguration) by default, which makes it easier for remote attackers to obtain access by guessing 24 bits of the MAC address and attempting a root login. This can be exploited in conjunction with CVE-2017-17878. Se ha descubierto un problema en la build 643 de Valve Steam Link. Cuando el demonio SSH está activado para desarrollo local, el dispositivo está disponible públicamente mediante el puerto 22 de TCP IPv6 en internet (con una autoconfiguración de dirección sin estado) por defecto. • https://blogger.davidmanouchehri.com/2017/12/steam-link-security-remotely-insecure.html https://github.com/ValveSoftware/steamlink-sdk#ssh-access https://github.com/ValveSoftware/steamlink-sdk/issues/119 •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

An issue was discovered in Valve Steam Link build 643. Root passwords longer than 8 characters are truncated because of the default use of DES (aka the CONFIG_FEATURE_DEFAULT_PASSWD_ALGO="des" setting). Se ha descubierto un problema en la build 643 de Valve Steam Link. Las contraseñas root que sobrepasen los 8 caracteres se truncan debido al uso de DES por defecto (también conocido como el ajuste CONFIG_F EATURE_DEFAULT_PASSWD_ALGO="des"). • https://blogger.davidmanouchehri.com/2017/12/steam-link-security-truncated-password.html https://github.com/ValveSoftware/steamlink-sdk/issues/101 https://github.com/ValveSoftware/steamlink-sdk/issues/110 • CWE-327: Use of a Broken or Risky Cryptographic Algorithm •

CVSS: 4.8EPSS: 0%CPEs: 1EXPL: 2

Valve Steam 3.42.16.13 uses weak permissions for the files in the Steam program directory, which allows local users to modify the files and possibly gain privileges as demonstrated by a Trojan horse Steam.exe file. Valve Steam 3.42.16.13 utiliza permisos débiles para los archivos en el directorio de programa Steam, lo que permite a usuarios locales modificar los archivos y posiblemente obtener privilegios como lo demuestra un archivo troyano Steam.exe Valve Steam version 3.42.16.13 suffers from a local privilege escalation vulnerability. • https://www.exploit-db.com/exploits/39888 https://packetstormsecurity.com/files/137343/Valve-Steam-3.42.16.13-Local-Privilege-Escalation.html • CWE-264: Permissions, Privileges, and Access Controls •