- Revenera Community
- :
- InstallShield
- :
- InstallShield Knowledge Base
- :
- Security patch for the possible privileged escalation scenarios identified in InstallShield
- Mark as New
- Mark as Read
- Subscribe
- Printer Friendly Page
- Report Inappropriate Content
Security patch for the possible privileged escalation scenarios identified in InstallShield
Security patch for the possible privileged escalation scenarios identified in InstallShield
Summary
Adding an InstallScript custom action to a Basic MSI or InstallScript MSI project extracts few binaries to a predefined writable folder during installation time. The standard user account has write access to these files and folders, hence replacing them during installation time can lead to a DLL hijacking vulnerability. Revenera has issued a security patch to correct this flaw.
Resolution
This security fix avoids using known folders and only extracts to a new random secured folder every time the setup is launched. These secured folders have proper access controls so that the standard user cannot access them in all possible scenarios.
Patch for InstallShield 2022 R2
To apply the fix, download the InstallShield 2022 R2 Security Patch.exe and run it on the machine that has either InstallShield 2022 R2 or Standalone Build (SAB) products installed.
To run the patch installation silently:
Download the InstallShield 2022 R2 Security Patch.exe to a temporary folder on the machine on which you want to apply the fix.
- Download the IS2022R2SecurityPatch.zip file, extract the IS2022R2SecurityPatch.iss file from the .zip file, and place the IS2022R2SecurityPatch.iss file in the same folder as the ‘InstallShield 2022 R2 Security Patch.exe’ patch file.
- Open a Command Prompt window with elevated privileges. (To do so, right-click the shortcut for the Command Prompt window, and then click Run as administrator.)
- Run the following command:
"C:\Path\InstallShield 2022 R2 Security Patch.exe" /s /f1"C:\Path\IS2022R2SecurityPatch.iss"
where the path (C:\Path\) is replaced with the appropriate location.
When the patch is run, it will correct all the identified security flaws in the above products that are installed on the machine.
To determine if the InstallShield Hotfix has been installed, verify the version of the following files:
The following files will be updated to version 28.0.0.763:
<ISInstallLocation>\Redist\Language Independent\i386
- ISSetup.dll
- setup.exe
- setupPreReq.exe
- SFHelper.dll
<ISInstallLocation>\Redist\Language Independent\x64
- setup.exe
- setupPreReq.exe
- SFHelper.dll
<ISInstallLocation>\Redist\Language Independent\i386\ISP
- ISSetup.dll
- setup.exe
- Setup.ocx
<ISInstallLocation>\System
- ISSetup.dll
- Mark as Read
- Mark as New
- Permalink
- Report Inappropriate Content
This installer did not run on our server with InstallShield 2022 R2 Standalone Build installed, but gave the error message "InstallShield 2022 R2 must be installed to run this update. The setup will now exit."
This patch did work on the workstation where the IDE is installed.
Please advise.
- Mark as Read
- Mark as New
- Permalink
- Report Inappropriate Content
Hi @ch_eng2 ,
Thank you for contacting us. Updated patch installer to consider Standalone Build (SAB) upgrade scenario. Please check now.
- Mark as Read
- Mark as New
- Permalink
- Report Inappropriate Content
@Varaprasad It worked now, thank you!
- Mark as Read
- Mark as New
- Permalink
- Report Inappropriate Content
@Varaprasad Is there a CVE ID associated with this?