cve-2019-12042
Vulnerability from cvelistv5
Published
2019-05-23 13:30
Modified
2024-08-04 23:10
Severity ?
EPSS score ?
Summary
Insecure permissions of the section object Global\PandaDevicesAgentSharedMemory and the event Global\PandaDevicesAgentSharedMemoryChange in Panda products before 18.07.03 allow attackers to queue an event (as an encrypted JSON string) to the system service AgentSvc.exe, which leads to privilege escalation when the CmdLineExecute event is queued. This affects Panda Antivirus, Panda Antivirus Pro, Panda Dome, Panda Global Protection, Panda Gold Protection, and Panda Internet Security.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/SouhailHammou/Panda-Antivirus-LPE | Exploit, Third Party Advisory | |
cve@mitre.org | https://rce4fun.blogspot.com/2019/05/panda-antivirus-local-privilege.html | Exploit, Third Party Advisory | |
cve@mitre.org | https://www.pandasecurity.com/usa/support/card?id=100063 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/SouhailHammou/Panda-Antivirus-LPE | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://rce4fun.blogspot.com/2019/05/panda-antivirus-local-privilege.html | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.pandasecurity.com/usa/support/card?id=100063 | Vendor Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:10:30.186Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/SouhailHammou/Panda-Antivirus-LPE" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.pandasecurity.com/usa/support/card?id=100063" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://rce4fun.blogspot.com/2019/05/panda-antivirus-local-privilege.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-05-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Insecure permissions of the section object Global\\PandaDevicesAgentSharedMemory and the event Global\\PandaDevicesAgentSharedMemoryChange in Panda products before 18.07.03 allow attackers to queue an event (as an encrypted JSON string) to the system service AgentSvc.exe, which leads to privilege escalation when the CmdLineExecute event is queued. This affects Panda Antivirus, Panda Antivirus Pro, Panda Dome, Panda Global Protection, Panda Gold Protection, and Panda Internet Security." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-23T13:30:44", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/SouhailHammou/Panda-Antivirus-LPE" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.pandasecurity.com/usa/support/card?id=100063" }, { "tags": [ "x_refsource_MISC" ], "url": "https://rce4fun.blogspot.com/2019/05/panda-antivirus-local-privilege.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-12042", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insecure permissions of the section object Global\\PandaDevicesAgentSharedMemory and the event Global\\PandaDevicesAgentSharedMemoryChange in Panda products before 18.07.03 allow attackers to queue an event (as an encrypted JSON string) to the system service AgentSvc.exe, which leads to privilege escalation when the CmdLineExecute event is queued. This affects Panda Antivirus, Panda Antivirus Pro, Panda Dome, Panda Global Protection, Panda Gold Protection, and Panda Internet Security." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/SouhailHammou/Panda-Antivirus-LPE", "refsource": "MISC", "url": "https://github.com/SouhailHammou/Panda-Antivirus-LPE" }, { "name": "https://www.pandasecurity.com/usa/support/card?id=100063", "refsource": "CONFIRM", "url": "https://www.pandasecurity.com/usa/support/card?id=100063" }, { "name": "https://rce4fun.blogspot.com/2019/05/panda-antivirus-local-privilege.html", "refsource": "MISC", "url": "https://rce4fun.blogspot.com/2019/05/panda-antivirus-local-privilege.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-12042", "datePublished": "2019-05-23T13:30:44", "dateReserved": "2019-05-13T00:00:00", "dateUpdated": "2024-08-04T23:10:30.186Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pandasecurity:panda_antivirus:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"18.07.03\", \"matchCriteriaId\": \"08FE25D1-0BAA-4485-BB5B-38D5914D636F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pandasecurity:panda_antivirus_pro:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"18.07.03\", \"matchCriteriaId\": \"3617D2AB-18DF-4DC8-9A7F-7563A700084E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pandasecurity:panda_dome:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"18.07.03\", \"matchCriteriaId\": \"A6AE875C-BD9C-45A8-89B1-AF1328D61EC0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pandasecurity:panda_global_protection:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"18.07.03\", \"matchCriteriaId\": \"1781B26F-3ED4-4854-90F1-B3EB880EDEA5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pandasecurity:panda_gold_protection:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"18.07.03\", \"matchCriteriaId\": \"798756C5-D99A-46FA-87F8-BA8E50EEC5E2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pandasecurity:panda_internet_security:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"18.07.03\", \"matchCriteriaId\": \"8A0CA4F5-BCA1-4272-ACC9-2D2941944978\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Insecure permissions of the section object Global\\\\PandaDevicesAgentSharedMemory and the event Global\\\\PandaDevicesAgentSharedMemoryChange in Panda products before 18.07.03 allow attackers to queue an event (as an encrypted JSON string) to the system service AgentSvc.exe, which leads to privilege escalation when the CmdLineExecute event is queued. This affects Panda Antivirus, Panda Antivirus Pro, Panda Dome, Panda Global Protection, Panda Gold Protection, and Panda Internet Security.\"}, {\"lang\": \"es\", \"value\": \"Los permisos no seguros del objeto de la secci\\u00f3n Global\\\\PandaDevicesAgentSharedMemory y el evento Global\\\\PandaDevicesAgentSharedMemoryChange en los productos de Panda antes de la versi\\u00f3n 18.07.03, permiten que los atacantes pongan en cola un evento (como una cadena cifrada JSON) al servicio del sistema AgentSvc.exe, lo que lleva a una escalada de privilegios cuando el evento CmdLineExecute est\\u00e1 en cola. Esto afecta a Panda Antivirus, Panda Antivirus Pro, Panda Dome, Panda Global Protection, Panda Gold Protection y Panda Internet Security.\"}]", "id": "CVE-2019-12042", "lastModified": "2024-11-21T04:22:09.413", "metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 10.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2019-05-23T14:29:07.673", "references": "[{\"url\": \"https://github.com/SouhailHammou/Panda-Antivirus-LPE\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://rce4fun.blogspot.com/2019/05/panda-antivirus-local-privilege.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://www.pandasecurity.com/usa/support/card?id=100063\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://github.com/SouhailHammou/Panda-Antivirus-LPE\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://rce4fun.blogspot.com/2019/05/panda-antivirus-local-privilege.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://www.pandasecurity.com/usa/support/card?id=100063\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]", "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-732\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2019-12042\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2019-05-23T14:29:07.673\",\"lastModified\":\"2024-11-21T04:22:09.413\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Insecure permissions of the section object Global\\\\PandaDevicesAgentSharedMemory and the event Global\\\\PandaDevicesAgentSharedMemoryChange in Panda products before 18.07.03 allow attackers to queue an event (as an encrypted JSON string) to the system service AgentSvc.exe, which leads to privilege escalation when the CmdLineExecute event is queued. This affects Panda Antivirus, Panda Antivirus Pro, Panda Dome, Panda Global Protection, Panda Gold Protection, and Panda Internet Security.\"},{\"lang\":\"es\",\"value\":\"Los permisos no seguros del objeto de la secci\u00f3n Global\\\\PandaDevicesAgentSharedMemory y el evento Global\\\\PandaDevicesAgentSharedMemoryChange en los productos de Panda antes de la versi\u00f3n 18.07.03, permiten que los atacantes pongan en cola un evento (como una cadena cifrada JSON) al servicio del sistema AgentSvc.exe, lo que lleva a una escalada de privilegios cuando el evento CmdLineExecute est\u00e1 en cola. Esto afecta a Panda Antivirus, Panda Antivirus Pro, Panda Dome, Panda Global Protection, Panda Gold Protection y Panda Internet Security.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-732\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pandasecurity:panda_antivirus:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"18.07.03\",\"matchCriteriaId\":\"08FE25D1-0BAA-4485-BB5B-38D5914D636F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pandasecurity:panda_antivirus_pro:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"18.07.03\",\"matchCriteriaId\":\"3617D2AB-18DF-4DC8-9A7F-7563A700084E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pandasecurity:panda_dome:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"18.07.03\",\"matchCriteriaId\":\"A6AE875C-BD9C-45A8-89B1-AF1328D61EC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pandasecurity:panda_global_protection:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"18.07.03\",\"matchCriteriaId\":\"1781B26F-3ED4-4854-90F1-B3EB880EDEA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pandasecurity:panda_gold_protection:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"18.07.03\",\"matchCriteriaId\":\"798756C5-D99A-46FA-87F8-BA8E50EEC5E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pandasecurity:panda_internet_security:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"18.07.03\",\"matchCriteriaId\":\"8A0CA4F5-BCA1-4272-ACC9-2D2941944978\"}]}]}],\"references\":[{\"url\":\"https://github.com/SouhailHammou/Panda-Antivirus-LPE\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://rce4fun.blogspot.com/2019/05/panda-antivirus-local-privilege.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://www.pandasecurity.com/usa/support/card?id=100063\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://github.com/SouhailHammou/Panda-Antivirus-LPE\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://rce4fun.blogspot.com/2019/05/panda-antivirus-local-privilege.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://www.pandasecurity.com/usa/support/card?id=100063\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.