Summary
A security update for the New Relic Infrastructure agent for Windows corrects an issue where the agent may follow unprivileged hard links or junction folders.
Release date: November 28, 2018
Vulnerability identifier: NR18-12
Priority: Low
Affected software
The following New Relic agent versions are affected:
Name | Affected version | Notes | Remediated version |
---|---|---|---|
Windows Infrastructure agent | <1.0.1052 | 1.0.1052 |
Vulnerability information
The New Relic Windows Infrastructure agent writes to various files as part of its normal operation. An unprivileged user may be able to use Windows hard link or folder junction policies to point to files in privileged locations. This could cause the agent to create or append data to privileged files.
Mitigating factors
- This vulnerability only exists on Windows systems.
Workarounds
Update to the latest New Relic Infrastructure agent for Windows.
Report security vulnerabilities to New Relic
New Relic is committed to the security of our customers and their data. If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic's coordinated disclosure program. For more information, see Reporting security vulnerabilities.
For more help
If you need more help, check out these support and learning resources:
- Browse the Explorers Hub to get help from the community and join in discussions.
- Find answers on our sites and learn how to use our support portal.
- Run New Relic Diagnostics, our troubleshooting tool for Linux, Windows, and macOS.
- Review New Relic's and and documentation.