First published: Wed Jul 10 2013(Updated: )
The signature-update functionality in Windows Defender on Microsoft Windows 7 and Windows Server 2008 R2 relies on an incorrect pathname, which allows local users to gain privileges via a Trojan horse application in the %SYSTEMDRIVE% top-level directory, aka "Microsoft Windows 7 Defender Improper Pathname Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Defender | ||
Microsoft Windows 7 | ||
Microsoft Windows Server 2008 Itanium | =r2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-3154 has a medium severity rating due to its potential for privilege escalation.
To mitigate CVE-2013-3154, ensure that you apply the latest security updates provided by Microsoft for Windows 7 and Windows Server 2008 R2.
CVE-2013-3154 affects Microsoft Windows 7 and Microsoft Windows Server 2008 R2.
Yes, local users can exploit CVE-2013-3154 through a Trojan horse application due to improper pathname handling.
The vulnerability affects the signature-update functionality of Windows Defender in the specified Windows operating systems.