CVE-2022-3421

CVSS V2 None CVSS V3 High 7.3
Description
An attacker can pre-create the `/Applications/Google\ Drive.app/Contents/MacOS` directory which is expected to be owned by root to be owned by a non-root user. When the Drive for Desktop installer is run for the first time, it will place a binary in that directory with execute permissions and set its setuid bit. Since the attacker owns the directory, the attacker can replace the binary with a symlink, causing the installer to set the setuid bit on the symlink. When the symlink is executed, it will run with root permissions. We recommend upgrading past version 64.0
Overview
  • CVE ID
  • CVE-2022-3421
  • Assigner
  • cve-coordination@google.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2022-10-17T20:15:09
  • Last Modified Date
  • 2022-10-19T18:10:01
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:a:google:drive:*:*:*:*:*:*:*:* 1 OR 64.0
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* 0 OR
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
  • Attack Vector
  • LOCAL
  • Attack Compatibility
  • LOW
  • Privileges Required
  • LOW
  • User Interaction
  • REQUIRED
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 7.3
  • Base Severity
  • HIGH
  • Exploitability Score
  • 1.3
  • Impact Score
  • 5.9
References
History
Created Old Value New Value Data Type Notes
2022-10-17 21:00:10 Added to TrackCVE
2022-12-07 08:28:32 security@google.com cve-coordination@google.com CVE Assigner updated
2022-12-07 08:28:32 2022-10-17T20:15Z 2022-10-17T20:15:09 CVE Published Date updated
2022-12-07 08:28:32 2022-10-19T18:10:01 CVE Modified Date updated
2022-12-07 08:28:32 Analyzed Vulnerability Status updated