First published: Fri Feb 14 2014(Updated: )
Untrusted search path vulnerability in Bandisoft Bandizip before 3.10 allows local users to gain privileges via a Trojan horse dwmapi.dll file in the current working directory.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Bandisoft Bandizip | <=3.09 | |
Bandisoft Bandizip | =3.00 | |
Bandisoft Bandizip | =3.01 | |
Bandisoft Bandizip | =3.02 | |
Bandisoft Bandizip | =3.03 | |
Bandisoft Bandizip | =3.04 | |
Bandisoft Bandizip | =3.05 | |
Bandisoft Bandizip | =3.06 | |
Bandisoft Bandizip | =3.07 | |
Bandisoft Bandizip | =3.08 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1680 has been classified as a high severity vulnerability due to the potential for privilege escalation.
To fix CVE-2014-1680, you should upgrade Bandisoft Bandizip to version 3.10 or later.
CVE-2014-1680 affects all versions of Bandisoft Bandizip before 3.10, including versions 3.00 to 3.09.
CVE-2014-1680 is an untrusted search path vulnerability that can be exploited locally.
An attacker could gain elevated privileges by placing a malicious dwmapi.dll file in the current working directory.