Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2019-3567
PUBLISHED
More InfoOfficial Page
Assigner-facebook
Assigner Org ID-4fc57720-52fe-4431-a0fb-3d2c8747b827
View Known Exploited Vulnerability (KEV) details
Published At-03 Jun, 2019 | 18:22
Updated At-04 Aug, 2024 | 19:12
Rejected At-
▼CVE Numbering Authority (CNA)

In some configurations an attacker can inject a new executable path into the extensions.load file for osquery and hard link a parent folder of a malicious binary to a folder with known 'safe' permissions. Under those circumstances osquery will load said malicious executable with SYSTEM permissions. The solution is to migrate installations to the 'Program Files' directory on Windows which restricts unprivileged write access. This issue affects osquery prior to v3.4.0.

Affected Products
Vendor
FacebookFacebook
Product
osquery
Versions
Affected
  • 3.4.0
  • From unspecified before 3.4.0 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-284Improper Access Control (CWE-284)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.facebook.com/security/advisories/cve-2019-3567
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.facebook.com/security/advisories/cve-2019-3567
x_refsource_MISC
x_transferred
Details not found