AnyDesk 7.0.9 allows a local user to gain SYSTEM privileges via a symbolic link because the user can write to their own %APPDATA% folder (used for ad.trace and chat) but the product runs as SYSTEM when writing chat-room data there.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
http://anydesk.com | vendor advisory |
http://packetstormsecurity.com/files/167608/AnyDesk-7.0.9-Arbitrary-File-Write-Denial-Of-Service.html | third party advisory vdb entry exploit |
https://seclists.org/fulldisclosure/2022/Jun/44 | mailing list third party advisory exploit |
http://seclists.org/fulldisclosure/2022/Jul/9 | mailing list third party advisory exploit |