WiX toolset lets developers create installers for Windows Installer, the Windows installation engine. When a bundle runs as SYSTEM user, Burn uses GetTempPathW which points to an insecure directory C:\Windows\Temp to drop and load multiple binaries. Standard users can hijack the binary before it's loaded in the application resulting in elevation of privileges. This vulnerability is fixed in 3.14.1 and 4.0.5.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-1002 | WiX toolset lets developers create installers for Windows Installer, the Windows installation engine. When a bundle runs as SYSTEM user, Burn uses GetTempPathW which points to an insecure directory C:\Windows\Temp to drop and load multiple binaries. Standard users can hijack the binary before it's loaded in the application resulting in elevation of privileges. This vulnerability is fixed in 3.14.1 and 4.0.5. |
Github GHSA |
GHSA-rf39-3f98-xr7r | WiX based installers are vulnerable to binary hijack when run as SYSTEM |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-13T14:28:49.838Z
Reserved: 2024-03-18T17:07:00.094Z
Link: CVE-2024-29187
Updated: 2024-08-02T01:10:54.048Z
Status : Awaiting Analysis
Published: 2024-03-24T20:15:08.003
Modified: 2024-11-21T09:07:45.380
Link: CVE-2024-29187
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA