Improper check of unusual conditions when launching msiexec.exe in safensec.com (SysWatch service) in SAFE'N'SEC SoftControl/SafenSoft SysWatch, SoftControl/SafenSoft TPSecure, and SoftControl/SafenSoft Enterprise Suite before 4.4.9 allows the local attacker to bypass a code-signing protection mechanism and install/execute an unauthorized program by modifying the system configuration and installing a forged MSI file. (The intended behavior is that the component SysWatch does not allow installation of MSI files unless they are signed by a limited list of certificates.)
References
Link | Resource |
---|---|
http://www.safensoft.com/security.phtml?c=865#SNSVE-2018-3 | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2018-06-29T15:00:00
Updated: 2018-06-29T15:57:01
Reserved: 2018-06-29T00:00:00
Link: CVE-2018-13013
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-06-29T15:29:00.317
Modified: 2019-10-03T00:03:26.223
Link: CVE-2018-13013
JSON object: View
Redhat Information
No data.
CWE