Overview
The Microsoft Windows MsiAdvertiseProduct function contains a race-condition vulnerability, which can allow an authentication attacker to elevate privileges to read protected files.
Description
The Microsoft Windows MsiAdvertiseProduct function allows a Windows installer product to generate a script to advertise a product to Windows, which handles shortcut and registry information associated with an installed application. The MsiAdvertiseProduct contains a race condition while performing checks, which can allow an attacker to read an arbitrary file which would otherwise be protected with filesystem ACLs. Exploit code for this vulnerability is publicly available. |
Impact
By calling the MsiAdvertiseProduct function in a crafted way, an authenticated attacker may be able to read files that would otherwise be restricted through filesystem ACLs. |
Solution
The CERT/CC is currently unaware of a practical solution to this problem. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 4.6 | AV:L/AC:L/Au:S/C:C/I:N/A:N |
Temporal | 4.4 | E:F/RL:U/RC:C |
Environmental | 4.3 | CDP:ND/TD:H/CR:ND/IR:ND/AR:ND |
References
Acknowledgements
This vulnerability was publicly disclosed by SandboxEscaper.
This document was written by Will Dormann.
Other Information
CVE IDs: | None |
Date Public: | 2018-12-19 |
Date First Published: | 2018-12-20 |
Date Last Updated: | 2018-12-20 21:11 UTC |
Document Revision: | 11 |