SB2020031110 - Privilege escalation in Windows Installer



SB2020031110 - Privilege escalation in Windows Installer

Published: March 11, 2020

Security Bulletin ID SB2020031110
Severity
Low
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Link following (CVE-ID: CVE-2020-0779)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to insecure processing of symbolic links in MSI packages within the Windows Installer. A local user can create a specially crafted symbolic link and elevate privileges on the system.


2) Insecure DLL loading (CVE-ID: CVE-2020-0798)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to Windows Installer fails to properly sanitize input leading to an insecure library loading behavior. A local user can place a malicious library on the affected filesystem and escalate privileges on the system.


3) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-0814)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to the way Windows Installer handles certain filesystem operations. A local user can escalate privileges on the system.


4) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-0842)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to the way Windows Installer handles certain filesystem operations. A local user can escalate privileges on the system.


5) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-0843)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to the way Windows Installer handles certain filesystem operations. A local user can escalate privileges on the system.


Remediation

Install update from vendor's website.