2 results (0.005 seconds)

CVSS: 7.0EPSS: %CPEs: 1EXPL: 0

Malwarebytes Antimalware Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Malwarebytes Antimalware. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Malwarebytes service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. • https://www.malwarebytes.com/secure/cves https://www.zerodayinitiative.com/advisories/ZDI-24-1195 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 2

EPP.sys in Emsisoft Anti-Malware prior to version 2018.12 allows an attacker to bypass ACLs because Interpreted Device Characteristics lacks FILE_DEVICE_SECURE_OPEN and therefore files and directories "inside" the \\.\EPP device are not properly protected, leading to unintended impersonation or object creation. This vulnerability has been fixed in version 2018.12 and later. EPP.sys en Emsisoft Anti-Malware, en versiones anteriores a la 2018.12, permite a los atacantes omitir las ACL debido a que las características de dispositivo interpretado carecen de FILE_DEVICE_SECURE_OPEN y, por tanto, los archivos y directorios "dentro" del dispositivo \\.\EPP no se protegen de manera adecuada, conduciendo a una suplantación o creación de objectos no intencionada. • https://blog.emsisoft.com/en/32517/new-in-2018-12-safe-web-browsing-with-emsisoft-browser-security https://github.com/nafiez/nafiez.github.io/blob/master/_posts/2019-01-09-emsisoft-Anti-Malware-bypass.md https://help.emsisoft.com/en/1760/vulnerability-report-en https://nafiez.github.io/security/bypass/2019/01/08/emsisoft-Anti-Malware-bypass.html •