The IsDriveLetterAvailable method in Driver/Ntdriver.c in TrueCrypt 7.0, VeraCrypt before 1.15, and CipherShed, when running on Windows, does not properly validate drive letter symbolic links, which allows local users to mount an encrypted volume over an existing drive letter and gain privileges via an entry in the /GLOBAL?? directory.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/133878/Truecrypt-7-Derived-Code-Windows-Drive-Letter-Symbolic-Link-Creation-Privilege-Escalation.html | Third Party Advisory VDB Entry |
http://www.openwall.com/lists/oss-security/2015/09/22/7 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2015/09/24/3 | Issue Tracking Mailing List Third Party Advisory |
https://code.google.com/p/google-security-research/issues/detail?id=538 | Third Party Advisory |
https://veracrypt.codeplex.com/wikipage?title=Release%20Notes | Release Notes Vendor Advisory |
https://www.exploit-db.com/exploits/38403/ | Third Party Advisory VDB Entry |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2017-10-02T19:00:00
Updated: 2017-10-02T18:57:01
Reserved: 2015-09-24T00:00:00
Link: CVE-2015-7358
JSON object: View
NVD Information
Status : Analyzed
Published: 2017-10-03T01:29:00.717
Modified: 2021-06-28T18:20:27.607
Link: CVE-2015-7358
JSON object: View
Redhat Information
No data.
CWE