vendor:
N/A
by:
Exploit Database
8.8
CVSS
HIGH
Race Condition
362
CWE
Product Name: N/A
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: No
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Windows
2020
Installer – capturing rolback scripts – patch bypass #2
This exploit is a race condition vulnerability in the installer. It allows an attacker to bypass the patch by setting a junction after the check but before it writes the DACL. The attacker can then trigger the rollback by pressing the cancel button. The exploit is complicated and requires the attacker to run polarbear.exe, open a cmd and run an installer, and use a filter in procmon.exe.
Mitigation:
The best way to mitigate this vulnerability is to ensure that the installer is not vulnerable to race conditions.