First published: Fri Jul 25 1997(Updated: )
The PATH in Windows NT includes the current working directory (.), which could allow local users to gain privileges by placing Trojan horse programs with the same name as commonly used system programs into certain directories.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows NT | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-1217 is considered a high-risk vulnerability due to the potential for local users to exploit it for unauthorized privilege escalation.
Fixing CVE-1999-1217 involves modifying the system PATH variable to exclude the current working directory or implementing strict access controls.
Any user operating Windows NT is potentially affected by CVE-1999-1217 if the current working directory is included in the PATH.
CVE-1999-1217 is associated with local privilege escalation attacks, where attackers can replace system programs with malicious versions.
Yes, a workaround for CVE-1999-1217 includes avoiding the use of the current directory in the PATH for non-administrative users.