CVE-2015-7358

The IsDriveLetterAvailable method in Driver/Ntdriver.c in TrueCrypt 7.0, VeraCrypt before 1.15, and CipherShed, when running on Windows, does not properly validate drive letter symbolic links, which allows local users to mount an encrypted volume over an existing drive letter and gain privileges via an entry in the /GLOBAL?? directory.

Published date
2017-10-03T01:29Z
Last modification date
2021-06-28T18:20Z
Assigner
cve@mitre.org
Problem type
CWE-264

Impact

CVSS v3 vector string
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
NameURLSourceTags
38403https://www.exploit-db.com/exploits/38403/EXPLOIT-DBThird Party Advisory, VDB Entry
https://veracrypt.codeplex.com/wikipage?title=Release%20Noteshttps://veracrypt.codeplex.com/wikipage?title=Release%20NotesCONFIRMRelease Notes, Vendor Advisory
https://code.google.com/p/google-security-research/issues/detail?id=538https://code.google.com/p/google-security-research/issues/detail?id=538MISCThird Party Advisory
[oss-security] 20150924 Re: CVE Request - TrueCrypt 7.1a and VeraCrypt 1.14 Local Elevation of Privilegehttp://www.openwall.com/lists/oss-security/2015/09/24/3MLISTIssue Tracking, Mailing List, Third Party Advisory
[oss-security] 20150922 CVE Request - TrueCrypt 7.1a and VeraCrypt 1.14 Local Elevation of Privilegehttp://www.openwall.com/lists/oss-security/2015/09/22/7MLISTMailing List, Third Party Advisory
http://packetstormsecurity.com/files/133878/Truecrypt-7-Derived-Code-Windows-Drive-Letter-Symbolic-Link-Creation-Privilege-Escalation.htmlhttp://packetstormsecurity.com/files/133878/Truecrypt-7-Derived-Code-Windows-Drive-Letter-Symbolic-Link-Creation-Privilege-Escalation.htmlMISCThird Party Advisory, VDB Entry