An Improper Privilege Management vulnerability in Trellix GetSusp prior to version 5.0.0.27 allows a local, low privilege attacker to gain access to files that usually require a higher privilege level. This is caused by GetSusp not correctly protecting a directory that it creates during execution, allowing an attacker to take over file handles used by GetSusp. As this runs with high privileges, the attacker gains elevated permissions. The file handles are opened as read-only.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-58374 An Improper Privilege Management vulnerability in Trellix GetSusp prior to version 5.0.0.27 allows a local, low privilege attacker to gain access to files that usually require a higher privilege level. This is caused by GetSusp not correctly protecting a directory that it creates during execution, allowing an attacker to take over file handles used by GetSusp. As this runs with high privileges, the attacker gains elevated permissions. The file handles are opened as read-only.
Fixes

Solution

Replace the version of GetSusp with version 5.0.0.27 or later.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: trellix

Published:

Updated: 2024-08-02T08:21:17.404Z

Reserved: 2023-11-14T09:37:31.829Z

Link: CVE-2023-6119

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-11-16T10:15:19.217

Modified: 2024-11-21T08:43:10.167

Link: CVE-2023-6119

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.