The iTopVPNmini.exe component of iTop VPN 3.2 will try to connect to datastate_iTopVPN_Pipe_Server on a loop. An attacker that opened a named pipe with the same name can use it to gain the token of another user by listening for connections and abusing ImpersonateNamedPipeClient().
Link | Tags |
---|---|
http://iobit.com | vendor advisory |
http://itop.com | not applicable |
https://github.com/tomerpeled92/CVE/ | third party advisory |