The Windows component of Centrify Authentication and Privilege Elevation Services 3.4.0, 3.4.1, 3.4.2, 3.4.3, 3.5.0, 3.5.1 (18.8), 3.5.2 (18.11), and 3.6.0 (19.6) does not properly handle an unspecified exception during use of partially trusted assemblies to serialize input data, which allows malicious users to execute arbitrary code inside the Centrify process via (1) a crafted application that makes a pipe connection to the process and sends malicious serialized data or (2) a crafted Microsoft Management Console snap-in control file.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
centrify authentication_service 3.4.0 |
||
centrify authentication_service 3.4.1 |
||
centrify authentication_service 3.4.2 |
||
centrify authentication_service 3.4.3 |
||
centrify authentication_service 3.5.0 |
||
centrify authentication_service 3.5.1 |
||
centrify authentication_service 3.5.2 |
||
centrify authentication_service 3.6.0 |
||
centrify privilege_elevation_service 3.4.0 |
||
centrify privilege_elevation_service 3.4.1 |
||
centrify privilege_elevation_service 3.4.2 |
||
centrify privilege_elevation_service 3.4.3 |
||
centrify privilege_elevation_service 3.5.0 |
||
centrify privilege_elevation_service 3.5.1 |
||
centrify privilege_elevation_service 3.5.2 |
||
centrify privilege_elevation_service 3.6.0 |