When the installation directory does not have sufficiently restrictive file permissions, an attacker can modify files in the installation directory to cause execution of malicious code.
During installation, installed file permissions are set to allow anyone to modify those files.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Arm_compiler | Arm | 5.00 (including) | 5.06 (including) |
Arm_compiler | Arm | 6.00 (including) | 6.20 (excluding) |
Arm_compiler_for_embedded_fusa | Arm | 6.16 (including) | 6.16 (including) |
Arm_compiler_for_functional_safety | Arm | 6.6 (including) | 6.6 (including) |
Arm_development_studio | Arm | * | * |
Arm_mobile_studio | Arm | * | * |
Ds_development_studio | Arm | 5.0.0 (including) | 5.29.3 (including) |
Fast_models | Arm | * | * |
Gnu_toolchain | Arm | * | * |
Keil_mdk | Arm | * | * |
Linaro_forge | Arm | * | 22.1 (excluding) |
Mbed_studio | Arm | * | * |