In ListCheck.exe in Acer Care Center 4.x prior to 4.00.3038, a vulnerability in the loading mechanism of Windows DLLs could allow a local malicious user to perform a DLL hijacking attack. This vulnerability is due to incorrect handling of directory search paths at run time. An attacker could exploit this vulnerability by placing a malicious DLL file on the targeted system. This file will execute when the vulnerable application launches. A successful exploit could allow the malicious user to execute arbitrary code on the targeted system with local administrator privileges.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
acer care center |