Description
A local privilege escalation vulnerability was discovered in Erlang/OTP prior to version 23.2.3. By adding files to an existing installation's directory, a local attacker could hijack accounts of other users running Erlang programs or possibly coerce a service running with "erlsrv.exe" to execute arbitrary code as Local System. This can occur only under specific conditions on Windows with unsafe filesystem permissions.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-15860 | A local privilege escalation vulnerability was discovered in Erlang/OTP prior to version 23.2.3. By adding files to an existing installation's directory, a local attacker could hijack accounts of other users running Erlang programs or possibly coerce a service running with "erlsrv.exe" to execute arbitrary code as Local System. This can occur only under specific conditions on Windows with unsafe filesystem permissions. |
References
History
No history.
Status: PUBLISHED
Assigner: DeepSurface
Published:
Updated: 2024-08-03T22:02:51.425Z
Reserved: 2021-03-25T00:00:00.000Z
Link: CVE-2021-29221
No data.
Status : Modified
Published: 2021-04-09T14:15:12.910
Modified: 2024-11-21T06:00:51.240
Link: CVE-2021-29221
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD