Vigil@nce - APR Core: read-write access via Windows Named Pipe
June 2015 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
A local attacker on Windows can bypass access restrictions of
Named Pipe of APR Core, in order to read or alter data.
– Impacted products: APR-core
– Severity: 2/4
– Creation date: 29/04/2015
DESCRIPTION OF THE VULNERABILITY
The APR library can be installed on Windows.
Named Pipes allow two processes to exchange their information.
However, a local attacker can replace a pipe to access to data.
A local attacker on Windows can therefore bypass access
restrictions of Named Pipe of APR Core, in order to read or alter
data.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/APR-Core-read-write-access-via-Windows-Named-Pipe-16767