logoalt Hacker News

High-Severity Vulnerability in Notepad++

21 pointsby onlinenotepadyesterday at 5:49 PM6 commentsview on HN

Comments

gertlexyesterday at 9:36 PM

Looks like it's a vulnerability in the installer.

From a small bit of skimming, sounds like it's a user escalation vector, where a low privileged user can run the installer in a contrived manner to achieve privilege escalation.

https://github.com/notepad-plus-plus/notepad-plus-plus/secur...

So for my personal install, nothing to worry about here...

reanimusyesterday at 9:33 PM

Headline is a little misleading imo -- the vulnerability isn't in Notepad++ itself as much as its installer. Current users, I imagine, don't have anything to worry about.

show 1 reply
retoxyesterday at 10:13 PM

If the problem is in the installer then this can't be 'fixed', affected installers should be fingerprinted as malware.

show 1 reply
notepad0x90yesterday at 10:37 PM

I wanted to say the installer has no business running things as SYSTEM but I suppose there is no way around that for registering COM DLLs. I would think Attackers would need to chain this with a Uac bypass (or be fortunate enough to find Uac disabled). If Uac is setup right, administrative operations like regsvr32 should require going through consent.exe's prompt. Uac bypasses are plenty but systems can be configured to mitigate them (at least the ones I know of). Social engineering is also another good way to bypass Uac.

aaron695today at 4:12 AM

[dead]