Description
WiX toolset lets developers create installers for Windows Installer, the Windows installation engine. When a bundle runs as SYSTEM user, Burn uses GetTempPathW which points to an insecure directory C:\Windows\Temp to drop and load multiple binaries. Standard users can hijack the binary before it's loaded in the application resulting in elevation of privileges. This vulnerability is fixed in 3.14.1 and 4.0.5.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-1002 | WiX toolset lets developers create installers for Windows Installer, the Windows installation engine. When a bundle runs as SYSTEM user, Burn uses GetTempPathW which points to an insecure directory C:\Windows\Temp to drop and load multiple binaries. Standard users can hijack the binary before it's loaded in the application resulting in elevation of privileges. This vulnerability is fixed in 3.14.1 and 4.0.5. |
Github GHSA |
GHSA-rf39-3f98-xr7r | WiX based installers are vulnerable to binary hijack when run as SYSTEM |
References
History
No history.
Subscriptions
No data.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-13T14:28:49.838Z
Reserved: 2024-03-18T17:07:00.094Z
Link: CVE-2024-29187
Updated: 2024-08-02T01:10:54.048Z
Status : Deferred
Published: 2024-03-24T20:15:08.003
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-29187
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA