Description
Tencent GameLoop before 4.1.21.90 downloaded updates over an insecure HTTP connection. A malicious attacker in an MITM position could spoof the contents of an XML document describing an update package, replacing a download URL with one pointing to an arbitrary Windows executable. Because the only integrity check would be a comparison of the downloaded file's MD5 checksum to the one contained within the XML document, the downloaded executable would then be executed on the victim's machine.
References
https://github.com/mmiszczyk/cve-2021-33879
https://github.com/mmiszczyk/cve-2021-33879
CVSS impact metrics
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.1 · High
Information
Source identifier
Vulnerability status
Modified
Published
2021-06-06T18:15:07.613Z
4 years agoLast modified
2024-11-21T05:09:42.217Z
1 year ago