A vulnerability in the encryption and permission implementation of Malwarebytes Anti-Malware consumer version 2.2.1 and prior (fixed in 3.0.4) allows an attacker to take control of the whitelisting feature (exclusions.dat under %SYSTEMDRIVE%\ProgramData) to permit execution of unauthorized applications including malware and malicious websites. Files blacklisted by Malwarebytes Malware Protect can be executed, and domains blacklisted by Malwarebytes Web Protect can be reached through HTTP.
References
Link | Resource |
---|---|
https://www.youtube.com/watch?v=LF5ic5nOoUY | Third Party Advisory |
https://github.com/mspaling/mbam-exclusions-poc-/blob/master/mbam-whitelist-poc.txt | Exploit Third Party Advisory |
https://github.com/mspaling/mbam-exclusions-poc- | Exploit Third Party Advisory |
https://forums.malwarebytes.com/topic/158251-malwarebytes-hall-of-fame/ | Vendor Advisory |
http://www.securitytube.net/video/16690 | Third Party Advisory |
Configurations
Information
Published : 2018-03-21 14:29
Updated : 2018-04-18 06:22
NVD link : CVE-2016-10717
Mitre link : CVE-2016-10717
JSON object : View
CWE
CWE-254
7PK - Security Features
Products Affected
malwarebytes
- malwarebytes_anti-malware