Unsafe usage of .NET deserialization in Named Pipe message processing allows privilege escalation to NT AUTHORITY\SYSTEM for a local attacker. Affected product is TinyWall, all versions up to and including 2.1.12. Fixed in version 2.1.13.
                
            References
                    | Link | Resource | 
|---|---|
| https://gist.github.com/pylorak/7df52c9325614676e07782dbe4e81582 | Third Party Advisory | 
| https://www.wilderssecurity.com/threads/beta-testing-tinywall.309739/page-62#post-2882843 | Third Party Advisory | 
| https://gist.github.com/pylorak/7df52c9325614676e07782dbe4e81582 | Third Party Advisory | 
| https://www.wilderssecurity.com/threads/beta-testing-tinywall.309739/page-62#post-2882843 | Third Party Advisory | 
Configurations
                    History
                    No history.
Information
                Published : 2019-12-30 18:15
Updated : 2024-11-21 04:34
NVD link : CVE-2019-19470
Mitre link : CVE-2019-19470
CVE.ORG link : CVE-2019-19470
JSON object : View
Products Affected
                tinywall
- tinywall
CWE
                
                    
                        
                        CWE-502
                        
            Deserialization of Untrusted Data
