Vulnerability Name: | CVE-2014-5455 (CCN-94482) | ||||||||
Assigned: | 2014-07-11 | ||||||||
Published: | 2014-07-11 | ||||||||
Updated: | 2020-06-01 | ||||||||
Summary: | Unquoted Windows search path vulnerability in the ptservice service prior to PrivateTunnel version 3.0 (Windows) and OpenVPN Connect version 3.1 (Windows) allows local users to gain privileges via a crafted program.exe file in the %SYSTEMDRIVE% folder. CWE-428: Unquoted Search Path or Element | ||||||||
CVSS v3 Severity: | 9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 6.9 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C) 5.6 Medium (Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:U/RC:UR)
5.8 Medium (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:U/RC:UR)
| ||||||||
Vulnerability Type: | CWE-428 | ||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||
References: | Source: MITRE Type: CNA CVE-2014-5455 Source: CCN Type: OpenVPN Web site OpenVPN Source: OSVDB Type: Broken Link 109007 Source: MISC Type: Exploit http://packetstormsecurity.com/files/127439/OpenVPN-Private-Tunnel-Privilege-Escalation.html Source: EXPLOIT-DB Type: Exploit 34037 Source: CCN Type: BID-68520 OpenVPN PrivateTunnel 'ptservice' Service Local Arbitrary Code Execution Vulnerability Source: MISC Type: Exploit http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5192.php Source: XF Type: UNKNOWN openvpn-ptservice-priv-esc(94482) Source: MISC Type: UNKNOWN https://github.com/CVEProject/cvelist/pull/3909 Source: MISC Type: UNKNOWN https://github.com/CVEProject/cvelist/pull/3909/commits/ace34f1cf94602f31760d3eb7ae68e17df8f914d Source: HP Type: Third Party Advisory HPSBGN3551 Source: CCN Type: Packet Storm Security [07-11-2014] OpenVPN Private Tunnel Privilege Escalation Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [07-12-2014] | ||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||
BACK |