Untrusted search path vulnerability in Installer of Mapping Tool 2.0.1.6 and 2.0.1.7 allows remote attackers to gain privileges via a Trojan horse DLL in an unspecified directory.
The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product's direct control.
Link | Tags |
---|---|
https://jvn.jp/en/jp/JVN33677949/index.html | third party advisory |
https://emdb.jaea.go.jp/emdb/en/mappingtool.html | vendor advisory |