Vulnerability Details : CVE-2014-5455
Unquoted Windows search path vulnerability in the ptservice service prior to PrivateTunnel version 3.0 (Windows) and OpenVPN Connect version 3.1 (Windows) allows local users to gain privileges via a crafted program.exe file in the %SYSTEMDRIVE% folder.
Products affected by CVE-2014-5455
- cpe:2.3:a:openvpn:openvpn:2.1.28.0:*:*:*:*:*:*:*
- cpe:2.3:a:privatetunnel:privatetunnel:2.3.8:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-5455
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 25 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-5455
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.9
|
MEDIUM | AV:L/AC:M/Au:N/C:C/I:C/A:C |
3.4
|
10.0
|
NIST |
CWE ids for CVE-2014-5455
-
The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-5455
-
http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5192.php
Zero Science Lab » OpenVPN Private Tunnel Core Service Unquoted Service Path Elevation Of PrivilegeExploit
-
http://www.exploit-db.com/exploits/34037
OpenVPN Private Tunnel Core Service - Unquoted Service Path Privilege Escalation - Windows_x86 local ExploitExploit
-
https://github.com/CVEProject/cvelist/pull/3909
Update CVE-2014-5455 with proper version information by dsommers · Pull Request #3909 · CVEProject/cvelist · GitHub
-
https://github.com/CVEProject/cvelist/pull/3909/commits/ace34f1cf94602f31760d3eb7ae68e17df8f914d
Update CVE-2014-5455 with proper version information by dsommers · Pull Request #3909 · CVEProject/cvelist · GitHub
-
http://packetstormsecurity.com/files/127439/OpenVPN-Private-Tunnel-Privilege-Escalation.html
OpenVPN Private Tunnel Privilege Escalation ≈ Packet StormExploit
-
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05325943
HP Support for Technical Help and Troubleshooting | HP® Customer Service.Third Party Advisory
Jump to