First published: Mon Jan 23 2017(Updated: )
Untrusted search path vulnerability in the installer for TrueCrypt 7.2 and 7.1a, VeraCrypt before 1.17-BETA, and possibly other products allows local users to execute arbitrary code with administrator privileges and conduct DLL hijacking attacks via a Trojan horse DLL in the "application directory", as demonstrated with the USP10.dll, RichEd20.dll, NTMarta.dll and SRClient.dll DLLs.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TrueCrypt | =7.1-a | |
TrueCrypt | =7.2 | |
VeraCrypt | <=1.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1281 has been classified with a high severity due to its potential to allow arbitrary code execution with administrator privileges.
To fix CVE-2016-1281, upgrade to VeraCrypt version 1.17-BETA or higher, as TrueCrypt is no longer maintained.
CVE-2016-1281 affects users of TrueCrypt versions 7.1a and 7.2, as well as VeraCrypt versions up to 1.16.
CVE-2016-1281 enables DLL hijacking attacks, allowing local users to execute malicious DLL files.
No, CVE-2016-1281 is an untrusted search path vulnerability that can only be exploited by local users.