Event JSON
{
"id": "776faa27e7d14fdcc83e0cbf62a7003059c0c69adf96ca8eba866471860e96c5",
"pubkey": "51ae1009e4403d821fc1c12e14bf4b40de44c7dc6177898840ca1ef9f9ebc768",
"created_at": 1726251152,
"kind": 1,
"tags": [
[
"proxy",
"https://infosec.exchange/@wdormann/113131595502204020",
"web"
],
[
"imeta",
"url https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/131/590/878/553/924/original/04e9ba1d9ab88fcc.png",
"m image/png"
],
[
"imeta",
"url https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/131/592/629/630/522/original/04e79a0758ba07c1.png",
"m image/png"
],
[
"proxy",
"https://infosec.exchange/users/wdormann/statuses/113131595502204020",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://infosec.exchange/users/wdormann/statuses/113131595502204020",
"pink.momostr"
],
[
"-"
]
],
"content": "This September's release of CVE-2024-38014 mitigates an entire class of LPE vulnerabilities on Windows. 🎉\n\nThat is, prior to this update, a non-admin user can trigger an MSI repair operation, which might do some unsafe things with SYSTEM privileges.\n\nAfter this update, such MSI files will prompt the user for admin credentials.\nhttps://sec-consult.com/blog/detail/msi-installer-repair-to-system-a-detailed-journey/\nhttps://media.infosec.exchange/infosec.exchange/media_attachments/files/113/131/590/878/553/924/original/04e9ba1d9ab88fcc.png\nhttps://media.infosec.exchange/infosec.exchange/media_attachments/files/113/131/592/629/630/522/original/04e79a0758ba07c1.png\n",
"sig": "db57f6f7071832200a75e58bb0828434276c80374d8558659fcc7a525de8bfa5d14f3a22dbb466193f7ab2470c7bc91ffdd162bbb271f6fbe1276e0665f589ce"
}