SB2023060514 - Multiple vulnerabilities in VIPRE Antivirus Plus



SB2023060514 - Multiple vulnerabilities in VIPRE Antivirus Plus

Published: June 5, 2023

Security Bulletin ID SB2023060514
Severity
Low
Patch available
NO
Number of vulnerabilities 5
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Link following (CVE-ID: CVE-2023-32175)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a link following issue within the Anti Malware Service. A local user can create a symbolic link to escalate privileges and execute arbitrary code in the context of SYSTEM.


2) Link following (CVE-ID: N/A)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a link following issue within the FPQuarTransfer method. A local user can create a symbolic link to delete arbitrary files, escalate privileges and execute arbitrary code in the context of SYSTEM.


3) Link following (CVE-ID: N/A)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a link following issue within the TelFileTransfer method. A local user can create a symbolic link to delete arbitrary files, escalate privileges and execute arbitrary code in the context of SYSTEM.


4) Path traversal (CVE-ID: CVE-2023-32177)

The vulnerability allows a local user to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences within the DeleteHistoryFile method. A local user can send a specially crafted HTTP request to escalate privileges and execute arbitrary code in the context of SYSTEM.


5) Path traversal (CVE-ID: CVE-2023-32176)

The vulnerability allows a local user to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences within the SetPrivateConfig method. A local user can send a specially crafted HTTP request to escalate privileges and execute arbitrary code in the context of SYSTEM.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.