From 3deeabd018813c4fde76260fe5fefc018868b1b5 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 10 Jul 2020 19:01:32 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/11xxx/CVE-2020-11081.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/2020/11xxx/CVE-2020-11081.json b/2020/11xxx/CVE-2020-11081.json index 69007843671..a930b457401 100644 --- a/2020/11xxx/CVE-2020-11081.json +++ b/2020/11xxx/CVE-2020-11081.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "osquery before version 4.4.0 enables a priviledge escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables local escalation. \n\nThis is fixed in version 4.4.0." + "value": "osquery before version 4.4.0 enables a priviledge escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables local escalation. This is fixed in version 4.4.0." } ] },