[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Windows Default Folder Tampering Vulnerability - CVE-2017-0295

ID: oval:org.secpod.oval:def:40899Date: (C)2017-06-14   (M)2024-03-06
Class: VULNERABILITYFamily: windows




A tampering vulnerability exists in Microsoft Windows that could allow an authenticated attacker to modify the C:\Users\DEFAULT folder structure. An attacker who successfully exploited this vulnerability could potentially modify files and folders that are synchronized the first time when a user logs in locally to the computer.To exploit this vulnerability, an attacker would need to log on to the affected system and tamper with the DEFAULT folder contents. An attacker can only exploit this vulnerability prior to a user logging on locally to the computer. Users who have logged on before the attacker attempts to exploit this vulnerability would not be affected.The security update addresses the vulnerability by correcting permissions on folders inside the DEFAULT folder structure.

Platform:
Microsoft Windows Server 2016
Microsoft Windows 10
Reference:
CVE-2017-0295
CVE    1
CVE-2017-0295
CPE    7
cpe:/o:microsoft:windows_10:1703:::x64
cpe:/o:microsoft:windows_10:1703:::x86
cpe:/o:microsoft:windows_10:1703
cpe:/o:microsoft:windows_server_2016:::x64
...

© SecPod Technologies