eset endpoint_antivirus 缺省权限不正确

CVE编号

CVE-2020-26941

利用情况

暂无

补丁情况

N/A

披露时间

2021-01-27
漏洞描述
A local (authenticated) low-privileged user can exploit a behavior in an ESET installer to achieve arbitrary file overwrite (deletion) of any file via a symlink, due to insecure permissions. The possibility of exploiting this vulnerability is limited and can only take place during the installation phase of ESET products. Furthermore, exploitation can only succeed when Self-Defense is disabled. Affected products are: ESET NOD32 Antivirus, ESET Internet Security, ESET Smart Security, ESET Smart Security Premium versions 13.2 and lower; ESET Endpoint Antivirus, ESET Endpoint Security, ESET NOD32 Antivirus Business Edition, ESET Smart Security Business Edition versions 7.3 and lower; ESET File Security for Microsoft Windows Server, ESET Mail Security for Microsoft Exchange Server, ESET Mail Security for IBM Domino, ESET Security for Kerio, ESET Security for Microsoft SharePoint Server versions 7.2 and lower.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 eset endpoint_antivirus * Up to
(including)
7.3
运行在以下环境
应用 eset endpoint_security * Up to
(including)
7.3
运行在以下环境
应用 eset file_security * Up to
(including)
7.2
运行在以下环境
应用 eset internet_security * Up to
(including)
13.2
运行在以下环境
应用 eset internet_security 1294 -
运行在以下环境
应用 eset mail_security * Up to
(including)
7.2
运行在以下环境
应用 eset nod32_antivirus * Up to
(including)
13.2
运行在以下环境
应用 eset nod32_antivirus * Up to
(including)
7.3
运行在以下环境
应用 eset security * Up to
(including)
7.2
运行在以下环境
应用 eset smart_security * Up to
(including)
13.2
运行在以下环境
应用 eset smart_security * Up to
(including)
7.3
CVSS3评分
5.5
  • 攻击路径
    本地
  • 攻击复杂度
  • 权限要求
  • 影响范围
    未更改
  • 用户交互
  • 可用性
  • 保密性
  • 完整性
CWE-ID 漏洞类型
CWE-276 缺省权限不正确
阿里云安全产品覆盖情况