漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
N/A
Vulnerability Description
A symbolic link manipulation vulnerability in Trellix Anti-Malware Engine prior to the January 2024 release allows an authenticated local user to potentially gain an escalation of privileges. This was achieved by adding an entry to the registry under the Trellix ENS registry folder with a symbolic link to files that the user wouldn't normally have permission to. After a scan, the Engine would follow the links and remove the files
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
Vulnerability Type
在文件访问前对链接解析不恰当(链接跟随)
Vulnerability Title
Trellix Anti-Malware Engine 后置链接漏洞
Vulnerability Description
Trellix Anti-Malware Engine是美国火眼(Trellix)公司的一个安全软件。 Trellix Anti-Malware Engine 6700版本存在后置链接漏洞,该漏洞源于存在符号链接操纵漏洞,允许经过身份验证的本地用户进行权限升级。
CVSS Information
N/A
Vulnerability Type
N/A