|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Windows >> pcAnywhere Launch with Windows Privilege Escalation Vulnerability Vulnerability Assessment Details
|
pcAnywhere Launch with Windows Privilege Escalation Vulnerability |
||
Checks for Launch with Windows privilege escalation vulnerability in pcAnywhere Detailed Explanation for this Vulnerability Assessment Summary : The remote control software on the remote host is affected by a local privilege escalation flaw. Description : The remote host is running pcAnywhere, a remote control software program for Windows. According to the Windows registry, the installed version of pcAnywhere fails to prevent a local user from gaining SYSTEM rights by manipulating the 'Caller Properties' feature to run arbitrary commands when pcAnywhere is configured to run as a service. See also : http://securityresponse.symantec.com/avcenter/security/Content/2005.06.10.html Solution : Upgrade to pcAnywhere version 11.5 or later. Network Security Threat Level: Medium / CVSS Base Score : 4 (AV:L/AC:L/Au:R/C:C/A:C/I:C/B:N) Networks Security ID: 13933 Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security |
||
Cables, Connectors |
|
||
No Discussions have been posted on this vulnerability. |