#VU37444 Input validation error in Panda Global Protection - CVE-2018-6322


| Updated: 2020-08-08

Vulnerability identifier: #VU37444

Vulnerability risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2018-6322

CWE-ID: CWE-20

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Panda Global Protection
Client/Desktop applications / Antivirus software/Personal firewalls

Vendor: Panda Security SL

Description

The vulnerability allows a local authenticated user to execute arbitrary code.

Panda Global Protection 17.0.1 allows local users to gain privileges or cause a denial of service by impersonating all the pipes through a use of .pipePSANMSrvcPpal -- an "insecurely created named pipe." Ensures full access to Everyone users group.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Panda Global Protection: 17.0.1


External links
https://seclists.org/fulldisclosure/2018/Mar/26


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability