A vulnerability has been found in Heimdal PRO v2.2.190, but it is most likely also present in Heimdal FREE and Heimdal CORP. Faulty permissions on the directory "C:\ProgramData\Heimdal Security\Heimdal Agent" allow BUILTIN\Users to write new files to the directory. On startup, the process Heimdal.MonitorServices.exe running as SYSTEM will attempt to load version.dll from this directory. Placing a malicious version.dll in this directory will result in privilege escalation. NOTE: any affected Heimdal products are completely unrelated to the Heimdal vendor of a Kerberos 5 product on the h5l.org web site.
References
Link | Resource |
---|---|
https://improsec.com/blog/heimdal-advisory-1 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2018-03-22T16:00:00
Updated: 2018-03-22T15:57:01
Reserved: 2018-01-11T00:00:00
Link: CVE-2018-5349
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-03-22T16:29:00.207
Modified: 2019-10-03T00:03:26.223
Link: CVE-2018-5349
JSON object: View
Redhat Information
No data.
CWE