CWE-114
Process Control
Executing commands or loading libraries from an untrusted source or in an untrusted environment can cause an application to execute malicious commands (and payloads) on behalf of an attacker.
CVE-2019-8453 (GCVE-0-2019-8453)
Vulnerability from cvelistv5
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Check Point ZoneAlarm |
Version: up to 15.4.062 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T21:17:31.426Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zonealarm.com/software/release-history/zafavfw.html#15.4.260.17960" }, { "name": "108029", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/108029" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Check Point ZoneAlarm", "vendor": "n/a", "versions": [ { "status": "affected", "version": "up to 15.4.062" } ] } ], "descriptions": [ { "lang": "en", "value": "Some of the DLLs loaded by Check Point ZoneAlarm up to 15.4.062 are taken from directories where all users have write permissions. This can allow a local attacker to replace a DLL file with a malicious one and cause Denial of Service to the client." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-114", "description": "CWE-114", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-23T15:06:11", "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "shortName": "checkpoint" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.zonealarm.com/software/release-history/zafavfw.html#15.4.260.17960" }, { "name": "108029", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/108029" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@checkpoint.com", "ID": "CVE-2019-8453", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Check Point ZoneAlarm", "version": { "version_data": [ { "version_value": "up to 15.4.062" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Some of the DLLs loaded by Check Point ZoneAlarm up to 15.4.062 are taken from directories where all users have write permissions. This can allow a local attacker to replace a DLL file with a malicious one and cause Denial of Service to the client." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-114" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.zonealarm.com/software/release-history/zafavfw.html#15.4.260.17960", "refsource": "MISC", "url": "https://www.zonealarm.com/software/release-history/zafavfw.html#15.4.260.17960" }, { "name": "108029", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108029" } ] } } } }, "cveMetadata": { "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "assignerShortName": "checkpoint", "cveId": "CVE-2019-8453", "datePublished": "2019-04-17T14:06:40", "dateReserved": "2019-02-18T00:00:00", "dateUpdated": "2024-08-04T21:17:31.426Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-8458 (GCVE-0-2019-8458)
Vulnerability from cvelistv5
► | URL | Tags |
---|---|---|
Vendor | Product | Version | ||
---|---|---|---|---|
Check Point | Check Point Endpoint Security Client for Windows, Anti-Malware blade |
Version: before E81.00 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T21:17:31.415Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk153053" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Check Point Endpoint Security Client for Windows, Anti-Malware blade", "vendor": "Check Point", "versions": [ { "status": "affected", "version": "before E81.00" } ] } ], "descriptions": [ { "lang": "en", "value": "Check Point Endpoint Security Client for Windows, with Anti-Malware blade installed, before version E81.00, tries to load a non-existent DLL during an update initiated by the UI. An attacker with administrator privileges can leverage this to gain code execution within a Check Point Software Technologies signed binary, where under certain circumstances may cause the client to terminate." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-114", "description": "CWE-114", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-20T16:44:33", "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "shortName": "checkpoint" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk153053" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@checkpoint.com", "ID": "CVE-2019-8458", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Check Point Endpoint Security Client for Windows, Anti-Malware blade", "version": { "version_data": [ { "version_value": "before E81.00" } ] } } ] }, "vendor_name": "Check Point" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Check Point Endpoint Security Client for Windows, with Anti-Malware blade installed, before version E81.00, tries to load a non-existent DLL during an update initiated by the UI. An attacker with administrator privileges can leverage this to gain code execution within a Check Point Software Technologies signed binary, where under certain circumstances may cause the client to terminate." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-114" } ] } ] }, "references": { "reference_data": [ { "name": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk153053", "refsource": "CONFIRM", "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk153053" } ] } } } }, "cveMetadata": { "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "assignerShortName": "checkpoint", "cveId": "CVE-2019-8458", "datePublished": "2019-06-20T16:44:33", "dateReserved": "2019-02-18T00:00:00", "dateUpdated": "2024-08-04T21:17:31.415Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-8461 (GCVE-0-2019-8461)
Vulnerability from cvelistv5
- CWE-114 - Process Control
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Check Point Endpoint Security Initial Client for Windows |
Version: before version E81.30 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T21:17:31.435Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk160812" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://safebreach.com/Post/Check-Point-Endpoint-Security-Initial-Client-for-Windows-Privilege-Escalation-to-SYSTEM" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Check Point Endpoint Security Initial Client for Windows", "vendor": "n/a", "versions": [ { "status": "affected", "version": "before version E81.30" } ] } ], "descriptions": [ { "lang": "en", "value": "Check Point Endpoint Security Initial Client for Windows before version E81.30 tries to load a DLL placed in any PATH location on a clean image without Endpoint Client installed. An attacker can leverage this to gain LPE using a specially crafted DLL placed in any PATH location accessible with write permissions to the user." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-114", "description": "CWE-114: Process Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-09-03T19:36:06", "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "shortName": "checkpoint" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk160812" }, { "tags": [ "x_refsource_MISC" ], "url": "https://safebreach.com/Post/Check-Point-Endpoint-Security-Initial-Client-for-Windows-Privilege-Escalation-to-SYSTEM" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@checkpoint.com", "ID": "CVE-2019-8461", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Check Point Endpoint Security Initial Client for Windows", "version": { "version_data": [ { "version_value": "before version E81.30" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Check Point Endpoint Security Initial Client for Windows before version E81.30 tries to load a DLL placed in any PATH location on a clean image without Endpoint Client installed. An attacker can leverage this to gain LPE using a specially crafted DLL placed in any PATH location accessible with write permissions to the user." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-114: Process Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk160812", "refsource": "MISC", "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk160812" }, { "name": "https://safebreach.com/Post/Check-Point-Endpoint-Security-Initial-Client-for-Windows-Privilege-Escalation-to-SYSTEM", "refsource": "MISC", "url": "https://safebreach.com/Post/Check-Point-Endpoint-Security-Initial-Client-for-Windows-Privilege-Escalation-to-SYSTEM" } ] } } } }, "cveMetadata": { "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "assignerShortName": "checkpoint", "cveId": "CVE-2019-8461", "datePublished": "2019-08-29T20:41:54", "dateReserved": "2019-02-18T00:00:00", "dateUpdated": "2024-08-04T21:17:31.435Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-11075 (GCVE-0-2020-11075)
Vulnerability from cvelistv5
- CWE-114 - Process Control
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
anchore | anchore-engine |
Version: = 0.7.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:14.644Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/anchore/anchore-engine/security/advisories/GHSA-w4rm-w22x-h7m5" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/anchore/anchore-engine/issues/430" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/anchore/anchore-engine/pull/431" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/anchore/anchore-engine/commit/e41786901f097fd32104447a45864073105d37db" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "anchore-engine", "vendor": "anchore", "versions": [ { "status": "affected", "version": "= 0.7.0" } ] } ], "descriptions": [ { "lang": "en", "value": "In Anchore Engine version 0.7.0, a specially crafted container image manifest, fetched from a registry, can be used to trigger a shell escape flaw in the anchore engine analyzer service during an image analysis process. The image analysis operation can only be executed by an authenticated user via a valid API request to anchore engine, or if an already added image that anchore is monitoring has its manifest altered to exploit the same flaw. A successful attack can be used to execute commands that run in the analyzer environment, with the same permissions as the user that anchore engine is run as - including access to the credentials that Engine uses to access its own database which have read-write ability, as well as access to the running engien analyzer service environment. By default Anchore Engine is released and deployed as a container where the user is non-root, but if users run Engine directly or explicitly set the user to \u0027root\u0027 then that level of access may be gained in the execution environment where Engine runs. This issue is fixed in version 0.7.1." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-114", "description": "CWE-114: Process Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-05-27T21:20:14", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/anchore/anchore-engine/security/advisories/GHSA-w4rm-w22x-h7m5" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/anchore/anchore-engine/issues/430" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/anchore/anchore-engine/pull/431" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/anchore/anchore-engine/commit/e41786901f097fd32104447a45864073105d37db" } ], "source": { "advisory": "GHSA-w4rm-w22x-h7m5", "discovery": "UNKNOWN" }, "title": "Shell Escape in Anchore Engine", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-11075", "STATE": "PUBLIC", "TITLE": "Shell Escape in Anchore Engine" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "anchore-engine", "version": { "version_data": [ { "version_value": "= 0.7.0" } ] } } ] }, "vendor_name": "anchore" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Anchore Engine version 0.7.0, a specially crafted container image manifest, fetched from a registry, can be used to trigger a shell escape flaw in the anchore engine analyzer service during an image analysis process. The image analysis operation can only be executed by an authenticated user via a valid API request to anchore engine, or if an already added image that anchore is monitoring has its manifest altered to exploit the same flaw. A successful attack can be used to execute commands that run in the analyzer environment, with the same permissions as the user that anchore engine is run as - including access to the credentials that Engine uses to access its own database which have read-write ability, as well as access to the running engien analyzer service environment. By default Anchore Engine is released and deployed as a container where the user is non-root, but if users run Engine directly or explicitly set the user to \u0027root\u0027 then that level of access may be gained in the execution environment where Engine runs. This issue is fixed in version 0.7.1." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-114: Process Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/anchore/anchore-engine/security/advisories/GHSA-w4rm-w22x-h7m5", "refsource": "CONFIRM", "url": "https://github.com/anchore/anchore-engine/security/advisories/GHSA-w4rm-w22x-h7m5" }, { "name": "https://github.com/anchore/anchore-engine/issues/430", "refsource": "MISC", "url": "https://github.com/anchore/anchore-engine/issues/430" }, { "name": "https://github.com/anchore/anchore-engine/pull/431", "refsource": "MISC", "url": "https://github.com/anchore/anchore-engine/pull/431" }, { "name": "https://github.com/anchore/anchore-engine/commit/e41786901f097fd32104447a45864073105d37db", "refsource": "MISC", "url": "https://github.com/anchore/anchore-engine/commit/e41786901f097fd32104447a45864073105d37db" } ] }, "source": { "advisory": "GHSA-w4rm-w22x-h7m5", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-11075", "datePublished": "2020-05-27T21:20:14", "dateReserved": "2020-03-30T00:00:00", "dateUpdated": "2024-08-04T11:21:14.644Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-11081 (GCVE-0-2020-11081)
Vulnerability from cvelistv5
- CWE-114 - Process Control
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:14.829Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/osquery/osquery/security/advisories/GHSA-2xwp-8fv7-c5pm" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/osquery/osquery/issues/6426" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/osquery/osquery/pull/6433" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/osquery/osquery/commit/4d4957f12a6aa0becc9d01d9f97061e1e3d809c5" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/osquery/osquery/releases/tag/4.4.0" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "osquery", "vendor": "osquery", "versions": [ { "status": "affected", "version": "\u003c 4.4.0" } ] } ], "descriptions": [ { "lang": "en", "value": "osquery before version 4.4.0 enables a privilege escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables local escalation. This is fixed in version 4.4.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-114", "description": "CWE-114: Process Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-17T16:52:34", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/osquery/osquery/security/advisories/GHSA-2xwp-8fv7-c5pm" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/osquery/osquery/issues/6426" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/osquery/osquery/pull/6433" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/osquery/osquery/commit/4d4957f12a6aa0becc9d01d9f97061e1e3d809c5" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/osquery/osquery/releases/tag/4.4.0" } ], "source": { "advisory": "GHSA-2xwp-8fv7-c5pm", "discovery": "UNKNOWN" }, "title": "osquery susceptible to DLL search order hijacking of zlib1.dll", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-11081", "STATE": "PUBLIC", "TITLE": "osquery susceptible to DLL search order hijacking of zlib1.dll" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "osquery", "version": { "version_data": [ { "version_value": "\u003c 4.4.0" } ] } } ] }, "vendor_name": "osquery" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "osquery before version 4.4.0 enables a privilege escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables local escalation. This is fixed in version 4.4.0." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-114: Process Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/osquery/osquery/security/advisories/GHSA-2xwp-8fv7-c5pm", "refsource": "CONFIRM", "url": "https://github.com/osquery/osquery/security/advisories/GHSA-2xwp-8fv7-c5pm" }, { "name": "https://github.com/osquery/osquery/issues/6426", "refsource": "MISC", "url": "https://github.com/osquery/osquery/issues/6426" }, { "name": "https://github.com/osquery/osquery/pull/6433", "refsource": "MISC", "url": "https://github.com/osquery/osquery/pull/6433" }, { "name": "https://github.com/osquery/osquery/commit/4d4957f12a6aa0becc9d01d9f97061e1e3d809c5", "refsource": "MISC", "url": "https://github.com/osquery/osquery/commit/4d4957f12a6aa0becc9d01d9f97061e1e3d809c5" }, { "name": "https://github.com/osquery/osquery/releases/tag/4.4.0", "refsource": "MISC", "url": "https://github.com/osquery/osquery/releases/tag/4.4.0" } ] }, "source": { "advisory": "GHSA-2xwp-8fv7-c5pm", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-11081", "datePublished": "2020-07-10T18:45:16", "dateReserved": "2020-03-30T00:00:00", "dateUpdated": "2024-08-04T11:21:14.829Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-6014 (GCVE-0-2020-6014)
Vulnerability from cvelistv5
- CWE-114 - Process Control
► | URL | Tags | |||
---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Check Point Endpoint Security Client for Windows |
Version: before E83.20 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:47:41.014Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://supportcontent.checkpoint.com/solutions?id=sk168081" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Check Point Endpoint Security Client for Windows", "vendor": "n/a", "versions": [ { "status": "affected", "version": "before E83.20" } ] } ], "descriptions": [ { "lang": "en", "value": "Check Point Endpoint Security Client for Windows, with Anti-Bot or Threat Emulation blades installed, before version E83.20, tries to load a non-existent DLL during a query for the Domain Name. An attacker with administrator privileges can leverage this to gain code execution within a Check Point Software Technologies signed binary, where under certain circumstances may cause the client to terminate." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-114", "description": "CWE-114: Process Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-30T14:22:05", "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "shortName": "checkpoint" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://supportcontent.checkpoint.com/solutions?id=sk168081" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@checkpoint.com", "ID": "CVE-2020-6014", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Check Point Endpoint Security Client for Windows", "version": { "version_data": [ { "version_value": "before E83.20" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Check Point Endpoint Security Client for Windows, with Anti-Bot or Threat Emulation blades installed, before version E83.20, tries to load a non-existent DLL during a query for the Domain Name. An attacker with administrator privileges can leverage this to gain code execution within a Check Point Software Technologies signed binary, where under certain circumstances may cause the client to terminate." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-114: Process Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://supportcontent.checkpoint.com/solutions?id=sk168081", "refsource": "MISC", "url": "https://supportcontent.checkpoint.com/solutions?id=sk168081" } ] } } } }, "cveMetadata": { "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "assignerShortName": "checkpoint", "cveId": "CVE-2020-6014", "datePublished": "2020-10-30T14:22:05", "dateReserved": "2020-01-07T00:00:00", "dateUpdated": "2024-08-04T08:47:41.014Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-6024 (GCVE-0-2020-6024)
Vulnerability from cvelistv5
- CWE-114 - Process Control
► | URL | Tags | |||
---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Check Point SmartConsole |
Version: R80.20, R80.30, R80.40, R81 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:47:41.027Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://supportcontent.checkpoint.com/solutions?id=sk142952" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Check Point SmartConsole", "vendor": "n/a", "versions": [ { "status": "affected", "version": "R80.20, R80.30, R80.40, R81" } ] } ], "descriptions": [ { "lang": "en", "value": "Check Point SmartConsole before R80.10 Build 185, R80.20 Build 119, R80.30 before Build 94, R80.40 before Build 415, and R81 before Build 548 were vulnerable to a possible local privilege escalation due to running executables from a directory with write access to all authenticated users." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-114", "description": "CWE-114: Process Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-26T16:19:49", "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "shortName": "checkpoint" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://supportcontent.checkpoint.com/solutions?id=sk142952" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@checkpoint.com", "ID": "CVE-2020-6024", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Check Point SmartConsole", "version": { "version_data": [ { "version_value": "R80.20, R80.30, R80.40, R81" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Check Point SmartConsole before R80.10 Build 185, R80.20 Build 119, R80.30 before Build 94, R80.40 before Build 415, and R81 before Build 548 were vulnerable to a possible local privilege escalation due to running executables from a directory with write access to all authenticated users." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-114: Process Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://supportcontent.checkpoint.com/solutions?id=sk142952", "refsource": "MISC", "url": "https://supportcontent.checkpoint.com/solutions?id=sk142952" } ] } } } }, "cveMetadata": { "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "assignerShortName": "checkpoint", "cveId": "CVE-2020-6024", "datePublished": "2021-01-20T18:17:53", "dateReserved": "2020-01-07T00:00:00", "dateUpdated": "2024-08-04T08:47:41.027Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-8107 (GCVE-0-2020-8107)
Vulnerability from cvelistv5
- CWE-114 - Process Control
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Bitdefender | Antivirus Plus |
Version: unspecified < 24.0.26.136 |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:48:25.632Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.bitdefender.com/support/security-advisories/process-control-vulnerability-bitdefender-antivirus-plus-va-8709/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Antivirus Plus", "vendor": "Bitdefender", "versions": [ { "lessThan": "24.0.26.136", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Internet Security", "vendor": "Bitdefender", "versions": [ { "lessThan": "24.0.26.136", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Total Security", "vendor": "Bitdefender", "versions": [ { "lessThan": "24.0.26.136", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "\uae40\ub3d9\ud604 - dsu.kr" } ], "datePublic": "2022-02-18T00:00:00", "descriptions": [ { "lang": "en", "value": "A Process Control vulnerability in ProductAgentUI.exe as used in Bitdefender Antivirus Plus allows an attacker to tamper with product settings via a specially crafted DLL file. This issue affects: Bitdefender Antivirus Plus versions prior to 24.0.26.136. Bitdefender Internet Security versions prior to 24.0.26.136. Bitdefender Total Security versions prior to 24.0.26.136." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-114", "description": "CWE-114 Process Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-18T08:20:11", "orgId": "b3d5ebe7-963e-41fb-98e1-2edaeabb8f82", "shortName": "Bitdefender" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.bitdefender.com/support/security-advisories/process-control-vulnerability-bitdefender-antivirus-plus-va-8709/" } ], "solutions": [ { "lang": "en", "value": "An automatic update to version 24.0.26.136 fixes the issue." } ], "source": { "defect": [ "VA-8709" ], "discovery": "EXTERNAL" }, "title": "Process Control vulnerability in Bitdefender Antivirus Plus", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-requests@bitdefender.com", "DATE_PUBLIC": "2022-02-18T10:00:00.000Z", "ID": "CVE-2020-8107", "STATE": "PUBLIC", "TITLE": "Process Control vulnerability in Bitdefender Antivirus Plus" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Antivirus Plus", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "24.0.26.136" } ] } }, { "product_name": "Internet Security", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "24.0.26.136" } ] } }, { "product_name": "Total Security", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "24.0.26.136" } ] } } ] }, "vendor_name": "Bitdefender" } ] } }, "credit": [ { "lang": "eng", "value": "\uae40\ub3d9\ud604 - dsu.kr" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Process Control vulnerability in ProductAgentUI.exe as used in Bitdefender Antivirus Plus allows an attacker to tamper with product settings via a specially crafted DLL file. This issue affects: Bitdefender Antivirus Plus versions prior to 24.0.26.136. Bitdefender Internet Security versions prior to 24.0.26.136. Bitdefender Total Security versions prior to 24.0.26.136." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-114 Process Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.bitdefender.com/support/security-advisories/process-control-vulnerability-bitdefender-antivirus-plus-va-8709/", "refsource": "MISC", "url": "https://www.bitdefender.com/support/security-advisories/process-control-vulnerability-bitdefender-antivirus-plus-va-8709/" } ] }, "solution": [ { "lang": "en", "value": "An automatic update to version 24.0.26.136 fixes the issue." } ], "source": { "defect": [ "VA-8709" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "b3d5ebe7-963e-41fb-98e1-2edaeabb8f82", "assignerShortName": "Bitdefender", "cveId": "CVE-2020-8107", "datePublished": "2022-02-18T08:20:11.896490Z", "dateReserved": "2020-01-28T00:00:00", "dateUpdated": "2024-09-16T17:39:04.749Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-23748 (GCVE-0-2022-23748)
Vulnerability from cvelistv5
- CWE-114 - Process Control
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Audinate Dante Application Library for Windows |
Version: All versions prior to and including 1.2.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:51:46.009Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cpr-zero.checkpoint.com/vulns/cprid-2193/%2C" }, { "tags": [ "x_transferred" ], "url": "https://www.audinate.com/learning/faqs/audinate-response-to-dante-discovery-mdnsresponder-exe-security-issue-cve-2022-23748" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-23748", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-06T17:19:39.559883Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2025-02-06", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-23748" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:37:34.509Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2025-02-06T00:00:00+00:00", "value": "CVE-2022-23748 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Audinate Dante Application Library for Windows", "vendor": "n/a", "versions": [ { "status": "affected", "version": "All versions prior to and including 1.2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "mDNSResponder.exe is vulnerable to DLL Sideloading attack. Executable improperly specifies how to load the DLL, from which folder and under what conditions. In these scenarios, a malicious attacker could be using the valid and legitimate executable to load malicious files." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-114", "description": "CWE-114: Process Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-14T00:00:00.000Z", "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "shortName": "checkpoint" }, "references": [ { "url": "https://cpr-zero.checkpoint.com/vulns/cprid-2193/%2C" }, { "url": "https://www.audinate.com/learning/faqs/audinate-response-to-dante-discovery-mdnsresponder-exe-security-issue-cve-2022-23748" } ] } }, "cveMetadata": { "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "assignerShortName": "checkpoint", "cveId": "CVE-2022-23748", "datePublished": "2022-11-17T00:00:00.000Z", "dateReserved": "2022-01-19T00:00:00.000Z", "dateUpdated": "2025-07-30T01:37:34.509Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-4487 (GCVE-0-2023-4487)
Vulnerability from cvelistv5
- CWE-114 - Process Control
Vendor | Product | Version | ||
---|---|---|---|---|
GE Digital | CIMPLICITY |
Version: 2023 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:31:05.481Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-243-02" }, { "tags": [ "x_transferred" ], "url": "https://digitalsupport.ge.com/s/article/GE-Digital-CIMPLICITY-Privilege-Escalation-Vulnerability" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-4487", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-16T21:20:27.625218Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-16T21:30:31.371Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "CIMPLICITY", "vendor": "GE Digital", "versions": [ { "status": "affected", "version": "2023" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "\u200bMichael Heinzl reported this vulnerability to CISA." } ], "datePublic": "2023-08-31T17:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eGE CIMPLICITY 2023 is by a process control vulnerability, which could allow a local attacker to insert malicious configuration files in the expected web server execution path to escalate privileges and gain full control of the HMI software.\u003c/span\u003e\n\n" } ], "value": "\nGE CIMPLICITY 2023 is by a process control vulnerability, which could allow a local attacker to insert malicious configuration files in the expected web server execution path to escalate privileges and gain full control of the HMI software.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-114", "description": "CWE-114 Process Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-05T22:55:45.047Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-243-02" }, { "url": "https://digitalsupport.ge.com/s/article/GE-Digital-CIMPLICITY-Privilege-Escalation-Vulnerability" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cp\u003e\u200bGE Digital recommends users apply the following mitigations:\u003c/p\u003e\u003cul\u003e\u003cli\u003e\u003cp\u003e\u200bUpdate CIMPLICITY to \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://digitalsupport.ge.com/s/article/CIMPLICITY-2023-SIM-1?language=en_US\"\u003ev2023 SIM 1\u003c/a\u003e\u0026nbsp;(login is required)\u003c/p\u003e\u003c/li\u003e\u003c/ul\u003e\u003cp\u003e\u200bPlease refer to \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://digitalsupport.ge.com/s/article/GE-Digital-CIMPLICITY-Privilege-Escalation-Vulnerability\"\u003eGE Digital\u2019s security bulletin\u003c/a\u003e\u0026nbsp;(login is required) for more information.\u003c/p\u003e" } ], "value": "\n\u200bGE Digital recommends users apply the following mitigations:\n\n * \u200bUpdate CIMPLICITY to v2023 SIM 1 https://digitalsupport.ge.com/s/article/CIMPLICITY-2023-SIM-1 \u00a0(login is required)\n\n\n\n\n\u200bPlease refer to GE Digital\u2019s security bulletin https://digitalsupport.ge.com/s/article/GE-Digital-CIMPLICITY-Privilege-Escalation-Vulnerability \u00a0(login is required) for more information.\n\n" } ], "source": { "advisory": "\u200b\u200bICSA-23-243-02", "discovery": "EXTERNAL" }, "title": "GE Digital CIMPLICITY Process Control", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2023-4487", "datePublished": "2023-09-05T22:55:45.047Z", "dateReserved": "2023-08-22T20:32:42.621Z", "dateUpdated": "2025-01-16T21:30:31.371Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Mitigation
Phase: Architecture and Design
Strategy: Libraries or Frameworks
Description:
- Libraries that are loaded should be well understood and come from a trusted source. The application can execute code contained in the native libraries, which often contain calls that are susceptible to other security problems, such as buffer overflows or command injection. All native libraries should be validated to determine if the application requires the use of the library. It is very difficult to determine what these native libraries actually do, and the potential for malicious code is high. In addition, the potential for an inadvertent mistake in these native libraries is also high, as many are written in C or C++ and may be susceptible to buffer overflow or race condition problems. To help prevent buffer overflow attacks, validate all input to native calls for content and length. If the native library does not come from a trusted source, review the source code of the library. The library should be built from the reviewed source before using it.
CAPEC-108: Command Line Execution through SQL Injection
An attacker uses standard SQL injection methods to inject data into the command line for execution. This could be done directly through misuse of directives such as MSSQL_xp_cmdshell or indirectly through injection of data into the database that would be interpreted as shell commands. Sometime later, an unscrupulous backend application (or could be part of the functionality of the same application) fetches the injected data stored in the database and uses this data as command line arguments without performing proper validation. The malicious data escapes that data plane by spawning new commands to be executed on the host.
CAPEC-640: Inclusion of Code in Existing Process
The adversary takes advantage of a bug in an application failing to verify the integrity of the running process to execute arbitrary code in the address space of a separate live process. The adversary could use running code in the context of another process to try to access process's memory, system/network resources, etc. The goal of this attack is to evade detection defenses and escalate privileges by masking the malicious code under an existing legitimate process. Examples of approaches include but not limited to: dynamic-link library (DLL) injection, portable executable injection, thread execution hijacking, ptrace system calls, VDSO hijacking, function hooking, reflective code loading, and more.