Description
BinaryNights ForkLift 3.4 was compiled with the com.apple.security.cs.disable-library-validation flag enabled which allowed a local attacker to inject code into ForkLift. This would allow the attacker to run malicious code with escalated privileges through ForkLift's helper tool.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-19715 | BinaryNights ForkLift 3.4 was compiled with the com.apple.security.cs.disable-library-validation flag enabled which allowed a local attacker to inject code into ForkLift. This would allow the attacker to run malicious code with escalated privileges through ForkLift's helper tool. |
References
| Link | Providers |
|---|---|
| https://insinuator.net/2020/11/forklift-lpe/ |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T16:11:35.986Z
Reserved: 2020-10-16T00:00:00.000Z
Link: CVE-2020-27192
No data.
Status : Modified
Published: 2020-11-17T02:15:13.627
Modified: 2024-11-21T05:20:50.550
Link: CVE-2020-27192
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD