• 公告ID (KylinSec-SA-2022-1387)

摘要:

Git for Windows is a fork of Git containing Windows-specific patches. Since part of Git for Windows uninstaller is copied into the current user s temporary directory and run in that place, it is important to ensure that there are no malicious `.dll` file in that directory that might be loaded as part of loading the executable. However, the default system settings for `TMP` and `TEMP` are to point to `C: Windows Temp`, a folder that is world-writable (for historical reasons), and the SYSTEM user account inherits those settings. This means that any authenticated user can place malicious `.dll` files that are loaded when Git for Windows uninstaller is run via the SYSTEM account. Fixes are available in Git for Windows v2.35.2 or newer. Users unable to upgrade may override SYSTEM s `TMP` environment variable to point to a directory exclusively under SYSTEM s control before running the uninstaller, clear `C: Windows Temp` of all `.dll` files before running the uninstaller, or run the uninstaller under an admin account rather than SYSTEM as a workaround.

安全等级: Low

公告ID: KylinSec-SA-2022-1387

发布日期: 2022年4月29日

关联CVE: CVE-2022-24767  

  • 详细介绍

1. 漏洞描述

   

Git for Windows is a fork of Git containing Windows-specific patches. Since part of Git for Windows uninstaller is copied into the current user s temporary directory and run in that place, it is important to ensure that there are no malicious `.dll` file in that directory that might be loaded as part of loading the executable. However, the default system settings for `TMP` and `TEMP` are to point to `C: Windows Temp`, a folder that is world-writable (for historical reasons), and the SYSTEM user account inherits those settings. This means that any authenticated user can place malicious `.dll` files that are loaded when Git for Windows uninstaller is run via the SYSTEM account. Fixes are available in Git for Windows v2.35.2 or newer. Users unable to upgrade may override SYSTEM s `TMP` environment variable to point to a directory exclusively under SYSTEM s control before running the uninstaller, clear `C: Windows Temp` of all `.dll` files before running the uninstaller, or run the uninstaller under an admin account rather than SYSTEM as a workaround.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2022-24767 KY3.4-4A git Unaffected
CVE-2022-24767 KY3.4-5 git Unaffected
CVE-2022-24767 KY3.5.1 git Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2022-1386 下一篇:KylinSec-SA-2022-1388