SB2018022613 - Untrusted search path in PureVPN



SB2018022613 - Untrusted search path in PureVPN

Published: February 26, 2018 Updated: August 8, 2020

Security Bulletin ID SB2018022613
CSH Severity
High
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 vulnerability.


1) Untrusted search path (CVE-ID: CVE-2018-7484)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

An issue was discovered in PureVPN through 5.19.4.0 on Windows. The client installation grants the Everyone group Full Control permission to the installation directory. In addition, the PureVPNService.exe service, which runs under NT AuthoritySYSTEM privileges, tries to load several dynamic-link libraries using relative paths instead of the absolute path. When not using a fully qualified path, the application will first try to load the library from the directory from which the application is started. As the residing directory of PureVPNService.exe is writable to all users, this makes the application susceptible to privilege escalation through DLL hijacking.


Remediation

Install update from vendor's website.