Summary
A security update for the New Relic Infrastructure agent for Windows corrects an issue where the agent may follow unprivileged hard links or junction folders.
Release date: November 28, 2018
Vulnerability identifier: NR18-12
Priority: Low
Affected software
The following New Relic agent versions are affected:
Name | Affected version | Notes | Remediated version |
---|---|---|---|
Windows Infrastructure agent | <1.0.1052 | 1.0.1052 |
Vulnerability information
The New Relic Windows Infrastructure agent writes to various files as part of its normal operation. An unprivileged user may be able to use Windows hard link or folder junction policies to point to files in privileged locations. This could cause the agent to create or append data to privileged files.
Mitigating factors
- This vulnerability only exists on Windows systems.
Workarounds
Update to the latest New Relic Infrastructure agent for Windows.
Report security vulnerabilities to New Relic
New Relic is committed to the security of our customers and their data. If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic's coordinated disclosure program. For more information, see Reporting security vulnerabilities.