This issue is rated as critical due to the possibility of arbitrary code execution.

CVE-2017-8522 TrustedInstaller in Windows allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.

CVE-2017-8517 TrustedInstaller in Windows allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.

CVE-2017-8516 TrustedInstaller in Windows allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.

CVE-2017-8515 TrustedInstaller in Windows allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.

CVE-2017-8514 TrustedInstaller in Windows allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.

CVE-2017-8513 TrustedInstaller in Windows allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
Red Hat Red Hat Enterprise Linux 6, Red Hat Enterprise Linux 7, and Red Hat Enterprise Linux 8 are vulnerable to a set of privilege escalation issues in the Red Hat Enterprise Linux Installer. An attacker can exploit these issues to gain higher privileges on the system.
Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 6 are vulnerable to a set of privilege escalation issues in the Red Hat Enterprise Linux Installer. An attacker can exploit these issues to gain higher privileges on the system.
Red

^

CVE-2017-8519, CVE-2017-8520, CVE-2017-8509, CVE-2017-8508, and CVE-2017-8507 are remote code execution vulnerabilities in the Linux kernel.

Red Hat Enterprise Linux 5 and 6 are vulnerable to a set of privilege escalation issues in the Red H atter Enterprise Linux Installer

Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 6 are vulnerable to a set of privilege escalation issues in the Red Hatter Enterprise Linux Installer. An attacker can exploit these issues to gain higher privileges on the system.

Timeline

Published on: 10/24/2022 14:15:00 UTC
Last modified on: 10/24/2022 18:45:00 UTC

References