Files
CVEs-PoC/2014/CVE-2014-4936.md
T
2024-06-18 02:51:15 +02:00

19 lines
899 B
Markdown

### [CVE-2014-4936](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4936)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The upgrade functionality in Malwarebytes Anti-Malware (MBAM) consumer before 2.0.3 and Malwarebytes Anti-Exploit (MBAE) consumer 1.04.1.1012 and earlier allow man-in-the-middle attackers to execute arbitrary code by spoofing the update server and uploading an executable.
### POC
#### Reference
- http://blog.0x3a.com/post/104954032239/cve-2014-4936-malwarebytes-anti-malware-and
- http://packetstormsecurity.com/files/130244/Malwarebytes-Anti-Malware-Anti-Exploit-Update-Remote-Code-Execution.html
#### Github
- https://github.com/0x3a/CVE-2014-4936