Description
A local privilege escalation vulnerability was discovered in Erlang/OTP prior to version 23.2.3. By adding files to an existing installation's directory, a local attacker could hijack accounts of other users running Erlang programs or possibly coerce a service running with "erlsrv.exe" to execute arbitrary code as Local System. This can occur only under specific conditions on Windows with unsafe filesystem permissions.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-15860 | A local privilege escalation vulnerability was discovered in Erlang/OTP prior to version 23.2.3. By adding files to an existing installation's directory, a local attacker could hijack accounts of other users running Erlang programs or possibly coerce a service running with "erlsrv.exe" to execute arbitrary code as Local System. This can occur only under specific conditions on Windows with unsafe filesystem permissions. |
References
History
No history.
Status: PUBLISHED
Assigner: DeepSurface
Published:
Updated: 2024-08-03T22:02:51.425Z
Reserved: 2021-03-25T00:00:00.000Z
Link: CVE-2021-29221
No data.
Status : Modified
Published: 2021-04-09T14:15:12.910
Modified: 2024-11-21T06:00:51.240
Link: CVE-2021-29221
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD