1. Home
  2. Security Notices & Advisories
  3. Security Advisory GOVSA.2019.1028.2 – Symbolic Link Hack

Security Advisory GOVSA.2019.1028.2 – Symbolic Link Hack

Advisory ID GOVSA.2019.1028.2
Vulnerability Type CWE-65 Windows Hard Link
(leads to Command Injections / Local Privilege Escalation)
Issue Date 2019-10-28
Updated On 2019-10-28 (Initial Advisory)
Application Goverlan Reach (Agent)
Affected Versions Goverlan Reach Console v9.20 and earlier
Goverlan Client Agent v9.20.02 and earlier
Severity Medium
Vulnerability Status Update Released

Summary

CVE

A vulnerability has been reported which allows a malicious actor to generate arbitrary files in any location within the local system, including within protected areas. This exploit can be used in conjunction with a DLL hijacking exploit and result in privilege escalation.

Vulnerability Type Remotely Exploitable Impact
Command Injection No Possible Local Code Execution
Local Privilege Escalation No Possible Escalation from Standard User to Local Administrative Privileges

Relevant Products

This exploit is exposed by the Goverlan Agent process: GovAgentx64.exe and GovAgent.exe versions 9.20.02 and earlier.

These Goverlan Client Agent are distributed on remote machine via the Goverlan Reach Console and Goverlan Reach Server versions 9.20 and 3.20 and earlier respectively.

Remediation

Product Action
Goverlan Reach Console v9.20.XX and earlier Update to v9.50 or later
Goverlan Reach Server v3.20.XX and earlier Update to v3.50 or later
Goverlan Client Agent v9.20.02 Update to v9.20.50 or later

Contacts

For further information about this security advisory, or to send us a security alert, please contact security(@)goverlan.com.

 

Updated on January 24, 2020

Related Articles