First published: Sat Sep 08 2012(Updated: )
Multiple untrusted search path vulnerabilities in RealFlex RealWin before 2.1.13, FlexView before 3.1.86, and RealWinDemo before 2.1.13 allow local users to gain privileges via a Trojan horse (1) realwin.dll or (2) keyhook.dll file in the current working directory.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
RealFlex RealWin | <=2.1.12 | |
RealFlex RealWin | =1.06 | |
RealFlex RealWin | =2.0 | |
RealFlex RealWin | =2.1 | |
Realflex Flexview | <=3.1.85 | |
Realflex Realwindemo | <=2.1.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3004 has a medium severity rating due to its potential for local privilege escalation.
To fix CVE-2012-3004, upgrade to RealFlex RealWin version 2.1.13 or later, FlexView version 3.1.86 or later, or RealWinDemo version 2.1.13 or later.
Affected versions include RealWin versions prior to 2.1.13, FlexView versions prior to 3.1.86, and RealWinDemo versions prior to 2.1.13.
CVE-2012-3004 is categorized as an untrusted search path vulnerability allowing local users to exploit privileges.
Local users can exploit CVE-2012-3004 by placing a Trojan horse DLL file in the current working directory.