SB2023060514 - Multiple vulnerabilities in VIPRE Antivirus Plus
Published: June 5, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Link following (CVE-ID: CVE-2023-32175)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a link following issue within the Anti Malware Service. A local user can create a symbolic link to escalate privileges and execute arbitrary code in the context of SYSTEM.
2) Link following (CVE-ID: N/A)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a link following issue within the FPQuarTransfer method. A local user can create a symbolic link to delete arbitrary files, escalate privileges and execute arbitrary code in the context of SYSTEM.
3) Link following (CVE-ID: N/A)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a link following issue within the TelFileTransfer method. A local user can create a symbolic link to delete arbitrary files, escalate privileges and execute arbitrary code in the context of SYSTEM.
4) Path traversal (CVE-ID: CVE-2023-32177)
The vulnerability allows a local user to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences within the DeleteHistoryFile method. A local user can send a specially crafted HTTP request to escalate privileges and execute arbitrary code in the context of SYSTEM.
5) Path traversal (CVE-ID: CVE-2023-32176)
The vulnerability allows a local user to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences within the SetPrivateConfig method. A local user can send a specially crafted HTTP request to escalate privileges and execute arbitrary code in the context of SYSTEM.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.