Computer Security
[EN] securityvulns.ru
no-pyccku

  

Checkpoint Endpoint Connect DLL hijacking
Published:17.06.2012
Source:BUGTRAQ
SecurityVulns ID:12421
Type:local
Level:5/10
Description:It's possible to load user provided library into system process.
Affected:CHECKPOINT : Checkpoint Endpoint Security VPN R75
CVE:CVE-2012-2753 (Untrusted search path vulnerability in TrGUI.exe in the Endpoint Connect (aka EPC) GUI in Check Point Endpoint Security R73.x and E80.x on the VPN blade platform, Endpoint Security VPN R75, Endpoint Connect R73.x, and Remote Access Clients E75.x allows local users to gain privileges via a Trojan horse DLL in the current working directory.)
Original documentdocumentmoshez_(at)_comsecglobal.com, Security Advisory - Checkpoint Endpoint Connect VPN - DLL Hijack (17.06.2012)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod

 
 



Rating@Mail.ru