CVE-2023-37250
https://notcve.org/view.php?id=CVE-2023-37250
Unity Parsec has a TOCTOU race condition that permits local attackers to escalate privileges to SYSTEM if Parsec was installed in "Per User" mode. The application intentionally launches DLLs from a user-owned directory but intended to always perform integrity verification of those DLLs. This affects Parsec Loader versions through 8. Parsec Loader 9 is a fixed version. • https://github.com/ewilded/CVE-2023-37250-POC https://support.parsec.app/hc/en-us/articles/18311425588237-CVE-2023-37250 https://unity3d.com https://www.kb.cert.org/vuls/id/287122 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •
CVE-2018-6651
https://notcve.org/view.php?id=CVE-2018-6651
In the uncurl_ws_accept function in uncurl.c in uncurl before 0.07, as used in Parsec before 140-3, insufficient Origin header validation (accepting an arbitrary substring match) for WebSocket API requests allows remote attackers to bypass intended access restrictions. In Parsec, this means full control over the victim's computer. En la función uncurl_ws_accept en uncurl.c en versiones anteriores a la 0.07 de uncurl, como se utiliza en Parsec en versiones anteriores a la 140-3, una validación insuficiente de cabeceras Origin (aceptando una correspondencia de subcadenas arbitraria) para peticiones API WebSocket permite que atacantes remotos omitan las restricciones de acceso previstas. En Parsec, esto implica control sobre el ordenador de la víctima. • https://gist.github.com/Zenexer/ac7601c0e367d876353137e5099b18a7 https://github.com/chrisd1100/uncurl/commit/448cd13e7b18c83855d706c564341ddd1e38e769 https://github.com/chrisd1100/uncurl/releases/tag/0.07 • CWE-352: Cross-Site Request Forgery (CSRF) •