When the directory containing the installer does not have sufficiently restrictive file permissions, an attacker can modify (or replace) the installer to execute malicious code.
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Arm
Published: 2023-07-27T21:47:25.882Z
Updated: 2023-07-27T21:47:25.882Z
Reserved: 2022-10-24T04:30:23.044Z
Link: CVE-2022-43702
JSON object: View
NVD Information
Status : Modified
Published: 2023-07-27T22:15:12.697
Modified: 2024-02-13T20:15:51.373
Link: CVE-2022-43702
JSON object: View
Redhat Information
No data.