A code variation of CVE-2021-41379 is exploited to create arbitrary files through a proof of concept tool. The tool requires parameters for the MSI to install, the installation path, and the file to overwrite/create. Once executed, the tool copies itself into the target file.
Reporter | Title | Published | Views | Family All 101 |
---|---|---|---|---|
![]() | CVE-2021-41379 | 10 Nov 202100:00 | – | attackerkb |
![]() | Microsoft Patch Tuesday, December 2021 Edition | 14 Dec 202122:23 | – | krebs |
![]() | CVE-2021-41379 | 10 Nov 202101:19 | – | nvd |
![]() | CVE-2021-43883 | 15 Dec 202115:15 | – | nvd |
![]() | CVE-2021-41379 | 10 Nov 202101:19 | – | cve |
![]() | CVE-2021-43883 | 15 Dec 202115:15 | – | cve |
![]() | Microsoft Windows Installer Service Link Following Privilege Escalation Vulnerability | 11 Nov 202100:00 | – | zdi |
![]() | CVE-2021-41379 Windows Installer Elevation of Privilege Vulnerability | 10 Nov 202100:46 | – | cvelist |
![]() | CVE-2021-43883 Windows Installer Elevation of Privilege Vulnerability | 15 Dec 202114:15 | – | cvelist |
![]() | Microsoft could not patch this vulnerability | 23 Nov 202110:56 | – | hivepro |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo