Dell Command Configure versions prior to 4.2.1 contain an uncontrolled search path vulnerability. A locally authenticated malicious user could exploit this vulnerability by creating a symlink to a target file, allowing the attacker to overwrite or corrupt a specified file on the system.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: dell

Published: 2019-12-06T20:40:13.655817Z

Updated: 2024-09-17T01:25:33.000Z

Reserved: 2019-10-29T00:00:00

Link: CVE-2019-18575

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-12-06T21:15:10.593

Modified: 2024-11-21T04:33:19.657

Link: CVE-2019-18575

cve-icon Redhat

No data.