The installer of Kaspersky Anti-Ransomware Tool (KART) prior to KART 4.0 Patch C was vulnerable to a DLL hijacking attack that allowed an attacker to elevate privileges during installation process.
The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.
Link | Tags |
---|---|
https://support.kaspersky.com/general/vulnerability.aspx?el=12430#290720 | broken link |
https://exchange.xforce.ibmcloud.com/vulnerabilities/192653 | third party advisory |