Cadastre-se agora para um orçamento mais personalizado!

Vulnerability Spotlight: TALOS-2018-0545 -Microsoft wimgapi LoadIntegrityInfo Code Execution Vulnerability

Jun, 13, 2018 Hi-network.com

Talos is disclosing a remote code execution vulnerability in the Microsoft wimgapi library. The wimgapi DLL is used in the Microsoft Windows operating system to perform operations on Windows Imaging Format (WIM) files. WIM is a file-based disk image format created by Microsoft to simplify the deployment of Windows systems. If an attacker creates a specially crafted WIM file, they could be able to execute malicious code with the same access rights as the logged-in user, or just crash the system with a denial-of-service attack. The vulnerability is related to the file header parsing, which means it gets triggered even on simple operations. WIM files do not have a registered file type handler by default, which means that this vulnerability cannot be triggered by tricking a user into double-clicking a WIM file - at least not without registering a file-handler first.

<<READ MORE>>


tag-icon Tags quentes : A Microsoft vulnerability 0-day vuldev

Copyright © 2014-2024 Hi-Network.com | HAILIAN TECHNOLOGY CO., LIMITED | All Rights Reserved.