A local privilege escalation vulnerability was discovered in Erlang/OTP prior to version 23.2.3. By adding files to an existing installation’s directory, a local attacker could hijack accounts of other users running Erlang programs or possibly coerce a service running with “erlsrv.exe” to execute arbitrary code as Local System. This can occur only under specific conditions on Windows with unsafe filesystem permissions.
CPE | Name | Operator | Version |
---|---|---|---|
otp | eq | OTP-22.1.7 | |
otp | eq | OTP-22.1.4 | |
otp | eq | OTP-19.1.1 | |
otp | eq | OTP-18.0.3 | |
otp | eq | OTP-21.3.8.10 | |
otp | eq | OTP-21.3.8.5 | |
otp | eq | OTP-22.0.5 | |
otp | eq | OTP-18.3.3 | |
otp | eq | OTP-17.5.1 | |
otp | eq | OTP-19.3.6.3 |