First published: Wed Aug 21 2019(Updated: )
Valve Steam Client for Windows through 2019-08-20 has weak folder permissions, leading to privilege escalation (to NT AUTHORITY\SYSTEM) via crafted use of CreateMountPoint.exe and SetOpLock.exe to leverage a TOCTOU race condition.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Steam Client | <=2019-08-20 | |
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15316 is a vulnerability in the Valve Steam Client for Windows that allows for privilege escalation via weak folder permissions.
CVE-2019-15316 has a severity rating of high, with a severity value of 7.
CVE-2019-15316 can be exploited by leveraging a TOCTOU race condition using CreateMountPoint.exe and SetOpLock.exe to escalate privileges to NT AUTHORITY\SYSTEM.
No, Microsoft Windows is not affected by CVE-2019-15316.
CVE-2019-15316 is associated with CWE-362 (Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')), CWE-367 (Time-of-Check Time-of-Use (TOCTOU) Race Condition), and CWE-732 (Incorrect Permission Assignment for Critical Resource).