Vulnerability Name: | CCN-63909 | ||||||
Published: | 2010-08-23 | ||||||
Updated: | 2010-08-23 | ||||||
Summary: | Microsoft Windows could allow a remote attacker to execute arbitrary code on the system. The lpksetup.exe application does not directly specify the fully qualified path to a dynamic-linked library (oci.dll) when running on Microsoft Windows. By persuading a victim to open a specially-crafted file from a WebDAV or SMB share using a vulnerable application, a remote attacker could exploit this vulnerability via a specially-crafted library to execute arbitrary code on the system. | ||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||
CVSS v2 Severity: | 9.3 High (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 8.0 High (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:POC/RL:W/RC:C)
| ||||||
Vulnerability Consequences: | Gain Access | ||||||
References: | Source: CCN Type: Microsoft Security Advisory (2269637) Insecure Library Loading Could Allow Remote Code Execution Source: CCN Type: BID-44414 Microsoft Windows 'lpksetup.exe' 'oci.dll' DLL Loading Arbitrary Code Execution Vulnerability Source: XF Type: UNKNOWN microsoftwindows-dll-ce(63909) Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database | ||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||
BACK |