Many of the services used by the affected product do not specify full paths for the DLLs they are loading. An attacker can exploit the uncontrolled search path by implanting their own DLL near the affected product’s binaries, thus hijacking the loaded DLL.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-24921 Many of the services used by the affected product do not specify full paths for the DLLs they are loading. An attacker can exploit the uncontrolled search path by implanting their own DLL near the affected product’s binaries, thus hijacking the loaded DLL.
Fixes

Solution

AUVESY recommends upgrading Versiondog to Version 8.1 or later (login required).


Workaround

No workaround given by the vendor.

History

Mon, 16 Sep 2024 19:45:00 +0000

Type Values Removed Values Added
Title AUVESY Versiondog AUVESY Versiondog

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-09-16T19:30:55.153Z

Reserved: 2021-08-10T00:00:00

Link: CVE-2021-38469

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-10-22T12:15:08.650

Modified: 2024-11-21T06:17:10.800

Link: CVE-2021-38469

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.