A security feature bypass exists when Windows incorrectly validates CAB file signatures. An attacker who successfully exploited this vulnerability could inject code into a CAB file without invalidating the file's signature.
To exploit the vulnerability, an attacker could modify a signed CAB file and inject malicious code. The attacker could then convince a target user to execute the file.
The update addresses the vulnerability by correcting how Windows validates file signatures.
References
Link | Resource |
---|---|
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1163 | Patch Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: microsoft
Published: 2019-08-14T20:55:03
Updated: 2024-05-29T16:50:54.494Z
Reserved: 2018-11-26T00:00:00
Link: CVE-2019-1163
JSON object: View
NVD Information
Status : Modified
Published: 2019-08-14T21:15:15.703
Modified: 2024-05-29T17:16:04.847
Link: CVE-2019-1163
JSON object: View
Redhat Information
No data.
CWE