First published: Fri Apr 11 2014(Updated: )
A race condition in the wmi_malware_scan.nbin plugin before 201402262215 for Nessus 5.2.1 allows local users to gain privileges by replacing the dissolvable agent executable in the Windows temp directory with a Trojan horse program.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tenable Nessus | =5.2.1 | |
Tenable Plugin-set | <=201402092115 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2848 has a moderate severity rating due to the potential for local privilege escalation.
To fix CVE-2014-2848, update to Nessus version 5.2.2 or later, which addresses the vulnerability.
Local users on systems running Nessus versions prior to 5.2.2, particularly 5.2.1 and certain plugin-sets, are affected by CVE-2014-2848.
CVE-2014-2848 is a race condition vulnerability that allows privilege escalation by replacing executable agents.
Exploiting CVE-2014-2848 could allow local users to gain elevated privileges and execute arbitrary code on the system.