CVE-2018-9434

In multiple functions of Parcel.cpp, there is a possible way to bypass address space layout randomization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Configurations

No configuration.

History

24 Mar 2025, 16:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-276

18 Feb 2025, 21:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.8
v2 : unknown
v3 : unknown
CWE CWE-129

21 Jan 2025, 17:15

Type Values Removed Values Added
CWE CWE-129
Summary
  • (es) En multiple functions de Parcel.cpp, existe una forma posible de evitar la aleatorización del diseño del espacio de direcciones. Esto podría generar una escalada local de privilegios sin necesidad de permisos de ejecución adicionales. No se necesita la interacción del usuario para la explotación.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

17 Jan 2025, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-17 23:15

Updated : 2025-03-24 16:15


NVD link : CVE-2018-9434

Mitre link : CVE-2018-9434

CVE.ORG link : CVE-2018-9434


JSON object : View

Products Affected

No product.

CWE
CWE-276

Incorrect Default Permissions