Windscribe における入力確認に関する脆弱性
| Title |
Windscribe における入力確認に関する脆弱性
|
| Summary |
Windscribe には、入力確認に関する脆弱性が存在します。
|
| Possible impacts |
情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution |
ベンダ情報および参考情報を参照して適切な対策を実施してください。 |
| Publication Date |
May 24, 2018, midnight |
| Registration Date |
July 12, 2018, 4 p.m. |
| Last Update |
July 12, 2018, 4 p.m. |
|
CVSS3.0 : 重要
|
| Score |
7.8
|
| Vector |
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
CVSS2.0 : 危険
|
| Score |
7.2
|
| Vector |
AV:L/AC:L/Au:N/C:C/I:C/A:C |
Affected System
| Windscribe Limited |
|
Windscribe 1.81
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
その他
Change Log
| No |
Changed Details |
Date of change |
| 1 |
[2018年07月12日] 掲載 |
July 12, 2018, 4 p.m. |
NVD Vulnerability Information
CVE-2018-11479
| Summary |
The VPN component in Windscribe 1.81 uses the OpenVPN client for connections. Also, it creates a WindScribeService.exe system process that establishes a \\.\pipe\WindscribeService named pipe endpoint that allows the Windscribe VPN process to connect and execute an OpenVPN process or other processes (like taskkill, etc.). There is no validation of the program name before constructing the lpCommandLine argument for a CreateProcess call. An attacker can run any malicious process with SYSTEM privileges through this named pipe.
|
| Publication Date |
May 26, 2018, 4:29 a.m. |
| Registration Date |
March 1, 2021, 6:46 p.m. |
| Last Update |
Nov. 21, 2024, 12:43 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:windscribe:windscribe:1.81:*:*:*:*:*:*:* |
|
|
|
|
Related information, measures and tools
Common Vulnerabilities List