Vulnerability Description
Untrusted search path vulnerability in TrGUI.exe in the Endpoint Connect (aka EPC) GUI in Check Point Endpoint Security R73.x and E80.x on the VPN blade platform, Endpoint Security VPN R75, Endpoint Connect R73.x, and Remote Access Clients E75.x allows local users to gain privileges via a Trojan horse DLL in the current working directory.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Checkpoint | Endpoint Connect | r73 |
| Checkpoint | Endpoint Security | e80 |
| Checkpoint | Endpoint Security Vpn | r75 |
| Checkpoint | Remote Access Clients | e75 |
References
- http://archives.neohapsis.com/archives/bugtraq/2012-06/0069.html
- https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsoPatchVendor Advisory
- http://archives.neohapsis.com/archives/bugtraq/2012-06/0069.html
- https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsoPatchVendor Advisory
FAQ
What is CVE-2012-2753?
CVE-2012-2753 is a vulnerability with a CVSS score of 6.9 (MEDIUM). Untrusted search path vulnerability in TrGUI.exe in the Endpoint Connect (aka EPC) GUI in Check Point Endpoint Security R73.x and E80.x on the VPN blade platform, Endpoint Security VPN R75, Endpoint C...
How severe is CVE-2012-2753?
CVE-2012-2753 has been rated MEDIUM with a CVSS base score of 6.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-2753?
Check the references section above for vendor advisories and patch information. Affected products include: Checkpoint Endpoint Connect, Checkpoint Endpoint Security, Checkpoint Endpoint Security Vpn, Checkpoint Remote Access Clients.