This hotfix fixes vulnerabilities in the Detours Library that's used by Microsoft Application Virtualization (App-V). The affected versions are the following:
An attacker who successfully exploits the information disclosure vulnerability could use the obtained information to bypass the ASLR security mechanism in Windows. This mechanism helps protect users from a broad range of vulnerabilities. The ASLR bypass by itself does not allow arbitrary code execution. However, an attacker could use the ASLR bypass together with another vulnerability, such as a remote code execution vulnerability, that could use the ASLR bypass to run arbitrary code.
To exploit the ASLR bypass, an attacker would have to log on to an affected system and run a specially crafted application. Workstations are primarily vulnerable to the potential ASLR bypass.
This security update addresses the ASLR bypass by correcting how App-V components handle memory addresses.
- App-V 5.1
- App-V 5.0 Service Pack 3 (SP3)
- App-V 4.6 SP3
- App-V 4.5 SP2
An attacker who successfully exploits the information disclosure vulnerability could use the obtained information to bypass the ASLR security mechanism in Windows. This mechanism helps protect users from a broad range of vulnerabilities. The ASLR bypass by itself does not allow arbitrary code execution. However, an attacker could use the ASLR bypass together with another vulnerability, such as a remote code execution vulnerability, that could use the ASLR bypass to run arbitrary code.
To exploit the ASLR bypass, an attacker would have to log on to an affected system and run a specially crafted application. Workstations are primarily vulnerable to the potential ASLR bypass.
This security update addresses the ASLR bypass by correcting how App-V components handle memory addresses.