漏洞标题
N/A
漏洞描述信息
在ModelSim(所有版本低于V2025.1)和Questa(所有版本低于V2025.1)中发现了一个漏洞。受影响的应用程序中包含的一个示例设置脚本允许从当前工作目录加载一个特定的可执行文件。这可能会使经过身份验证的本地攻击者在管理员或具有提升权限的进程从用户可写目录启动该脚本的安装中注入任意代码并提升权限。
CVSS信息
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
漏洞类别
对搜索路径元素未加控制
漏洞标题
N/A
漏洞描述信息
A vulnerability has been identified in ModelSim (All versions < V2025.1), Questa (All versions < V2025.1). An example setup script contained in affected applications allows a specific executable file to be loaded from the current working directory. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges in installations where administrators or processes with elevated privileges launch the script from a user-writable directory.
CVSS信息
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
漏洞类别
对搜索路径元素未加控制