Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:heimdalsecurity:heimdal:2.2.190:*:*:*:pro:*:*:*", "matchCriteriaId": "A73988CB-F37E-4460-B8FF-BFECB7525BDF", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability has been found in Heimdal PRO v2.2.190, but it is most likely also present in Heimdal FREE and Heimdal CORP. Faulty permissions on the directory \"C:\\ProgramData\\Heimdal Security\\Heimdal Agent\" allow BUILTIN\\Users to write new files to the directory. On startup, the process Heimdal.MonitorServices.exe running as SYSTEM will attempt to load version.dll from this directory. Placing a malicious version.dll in this directory will result in privilege escalation. NOTE: any affected Heimdal products are completely unrelated to the Heimdal vendor of a Kerberos 5 product on the h5l.org web site."}, {"lang": "es", "value": "Se ha encontrado una vulnerabilidad en Heimdal PRO v2.2.190, pero podr\u00eda estar tambi\u00e9n presente en Heimdal FREE y Heimdal CORP. Errores en los permisos del directorio \"C:\\ProgramData\\Heimdal Security\\Heimdal Agent\" permiten que BUILTIN\\Users escriba nuevos archivos en el directorio. En el arranque, el proceso Heimdal.MonitorServices.exe que se ejecuta como SYSTEM intentar\u00e1 cargar version.dll de este directorio. La colocaci\u00f3n de un version.dll malicioso en este directorio resultar\u00e1 en un escalado de privilegios. NOTA: ning\u00fan producto de Heimdal afectado tiene relaci\u00f3n con el fabricante de Heimdal de un producto Kerberos 5 en el sitio web h5l.org."}], "id": "CVE-2018-5349", "lastModified": "2024-11-21T04:08:38.060", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2018-03-22T16:29:00.207", "references": [{"source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"], "url": "https://improsec.com/blog/heimdal-advisory-1"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"], "url": "https://improsec.com/blog/heimdal-advisory-1"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-732"}], "source": "nvd@nist.gov", "type": "Primary"}]}