Untrusted search path vulnerability in Installer of CASL II simulator (self-extract format) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product's direct control.
Link | Tags |
---|---|
https://www.jitec.ipa.go.jp/1_20casl2/casl2dl_2017_01.html | vendor advisory |
https://jvn.jp/en/jp/JVN67305782/index.html | third party advisory vdb entry |