An issue was discovered in Listary through 6. An attacker can create a \\.\pipe\Listary.listaryService named pipe and wait for a privileged user to open a session on the Listary installed host. Listary will automatically access the named pipe and the attacker will be able to duplicate the victim's token to impersonate him. This exploit is valid in certain Windows versions (Microsoft has patched the issue in later Windows 10 builds).
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-12-14T15:31:14
Updated: 2021-12-14T15:31:14
Reserved: 2021-09-13T00:00:00
Link: CVE-2021-41065
JSON object: View
NVD Information
Status : Modified
Published: 2021-12-14T16:15:09.020
Modified: 2023-11-07T03:38:48.690
Link: CVE-2021-41065
JSON object: View
Redhat Information
No data.
CWE