A vulnerability in the encryption and permission implementation of Malwarebytes Anti-Malware consumer version 2.2.1 and prior (fixed in 3.0.4) allows an attacker to take control of the whitelisting feature (exclusions.dat under %SYSTEMDRIVE%\ProgramData) to permit execution of unauthorized applications including malware and malicious websites. Files blacklisted by Malwarebytes Malware Protect can be executed, and domains blacklisted by Malwarebytes Web Protect can be reached through HTTP.
References
Link | Resource |
---|---|
http://www.securitytube.net/video/16690 | Third Party Advisory |
https://forums.malwarebytes.com/topic/158251-malwarebytes-hall-of-fame/ | Vendor Advisory |
https://github.com/mspaling/mbam-exclusions-poc- | Exploit Third Party Advisory |
https://github.com/mspaling/mbam-exclusions-poc-/blob/master/mbam-whitelist-poc.txt | Exploit Third Party Advisory |
https://www.youtube.com/watch?v=LF5ic5nOoUY | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2018-03-21T21:00:00
Updated: 2018-03-21T21:57:01
Reserved: 2018-03-21T00:00:00
Link: CVE-2016-10717
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-03-21T21:29:00.280
Modified: 2018-04-18T13:22:36.500
Link: CVE-2016-10717
JSON object: View
Redhat Information
No data.
CWE