The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

vulnerability announce CVE-2019-8452 CVE-2019-8454

Check Point Endpoint Security: file corruption

Synthesis of the vulnerability

A local attacker can create a hard link, in order to alter the pointed file, with privileges of Check Point Endpoint Security.
Vulnerable systems: CheckPoint Endpoint Security.
Severity of this threat: 1/4.
Consequences of a hack: data creation/edition.
Pirate's origin: user shell.
Number of vulnerabilities in this bulletin: 2.
Creation date: 30/04/2019.
Références of this weakness: CVE-2019-8452, CVE-2019-8454, VIGILANCE-VUL-29162.

Description of the vulnerability

A local attacker can create a hard link, in order to alter the pointed file, with privileges of Check Point Endpoint Security.
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides a systems vulnerabilities announce. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system. Each administrator can customize the list of products for which he wants to receive vulnerability alerts. The technology watch team tracks security threats targeting the computer system.