First published: Fri Sep 07 2012(Updated: )
Untrusted search path vulnerability in tbb.dll in Intel Threading Building Blocks (TBB) 2.2.013 allows local users to gain privileges via a Trojan horse tbbmalloc.dll file in the current working directory, as demonstrated by a directory that contains a .pbk file. NOTE: some of these details are obtained from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Intel oneAPI Threading Building Blocks | =2.2.013 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-5269 has been classified as a medium severity vulnerability due to its ability to allow local users to gain elevated privileges.
To mitigate CVE-2010-5269, ensure that the tbbmalloc.dll file is not placed in the current working directory and update to a patched version of Intel Threading Building Blocks.
CVE-2010-5269 specifically affects Intel Threading Building Blocks version 2.2.013.
CVE-2010-5269 enables local privilege escalation attacks through the exploitation of an untrusted search path vulnerability.
CVE-2010-5269 is a local vulnerability, as it requires access to the affected system to exploit.