When the directory containing the installer does not have sufficiently restrictive file permissions, an attacker can modify (or replace) the installer to execute malicious code.
During installation, installed file permissions are set to allow anyone to modify those files.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Arm_compiler | Arm | 5.00 (including) | 5.06 (including) |
Arm_compiler | Arm | 6.00 (including) | 6.18 (excluding) |
Arm_compiler_for_embedded_fusa | Arm | 6.16 (including) | 6.16 (including) |
Arm_compiler_for_functional_safety | Arm | 6.6 (including) | 6.6.5 (excluding) |
Arm_development_studio | Arm | * | * |
Ds_development_studio | Arm | 5.0.0 (including) | 5.29.3 (including) |
Fast_models | Arm | * | * |