First published: Thu Mar 22 2018(Updated: )
An issue was discovered in Heimdal PRO 2.2.190. As part of the scanning feature, a process called md.hs writes an executable called CS1.tmp to C:\windows\TEMP. Afterwards the executable is run. It is possible for an attacker to create the file first, let md.hs overwrite it, and then rewrite the file in the window between md.hs closing the file and executing it. This can be exploited via opportunistic locks and a high priority thread. The vulnerability is triggered when a scan starts. NOTE: any affected Heimdal products are completely unrelated to the Heimdal vendor of a Kerberos 5 product on the h5l.org web site.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
heimdal | =2.2.190 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-5731 has a high severity due to the potential for local privilege escalation.
To fix CVE-2018-5731, update Heimdal PRO to the latest version that addresses this vulnerability.
The impact of CVE-2018-5731 allows attackers to execute arbitrary code by overwriting an executable in the system temporary directory.
CVE-2018-5731 affects users of Heimdal PRO version 2.2.190.
CVE-2018-5731 is primarily a local vulnerability and requires local access to exploit.