Valvesoftware

Steam Client

10 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 21.05.2025 00:00:00
  • Zuletzt bearbeitet 21.05.2025 20:24:58

An issue in Valvesoftware Steam Client Steam Client 1738026274 allows attackers to escalate privileges via a crafted executable or DLL.

Exploit
  • EPSS 10.98%
  • Veröffentlicht 10.04.2021 19:15:11
  • Zuletzt bearbeitet 03.11.2025 06:15:32

Valve Steam before 2021-04-17, when a Source engine game is installed, allows remote authenticated users to execute arbitrary code because of a buffer overflow that occurs for a Steam invite after one click.

Exploit
  • EPSS 0.02%
  • Veröffentlicht 05.07.2020 01:15:10
  • Zuletzt bearbeitet 21.11.2024 05:05:42

An issue was discovered in Valve Steam Client 2.10.91.91. The installer allows local users to gain NT AUTHORITY\SYSTEM privileges because some parts of %PROGRAMFILES(X86)%\Steam and/or %COMMONPROGRAMFILES(X86)%\Steam have weak permissions during a cr...

Exploit
  • EPSS 0.1%
  • Veröffentlicht 04.10.2019 20:15:11
  • Zuletzt bearbeitet 21.11.2024 04:31:48

Valve Steam Client before 2019-09-12 allows placing or appending partially controlled filesystem content, as demonstrated by file modifications on Windows in the context of NT AUTHORITY\SYSTEM. This could lead to denial of service, elevation of privi...

  • EPSS 0.04%
  • Veröffentlicht 21.08.2019 20:15:12
  • Zuletzt bearbeitet 21.11.2024 04:28:26

Valve Steam Client for Windows through 2019-08-16 allows privilege escalation (to NT AUTHORITY\SYSTEM) because local users can replace the current versions of SteamService.exe and SteamService.dll with older versions that lack the CVE-2019-14743 patc...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 21.08.2019 20:15:12
  • Zuletzt bearbeitet 21.11.2024 04:28:26

Valve Steam Client for Windows through 2019-08-20 has weak folder permissions, leading to privilege escalation (to NT AUTHORITY\SYSTEM) via crafted use of CreateMountPoint.exe and SetOpLock.exe to leverage a TOCTOU race condition.

Exploit
  • EPSS 0.02%
  • Veröffentlicht 07.08.2019 15:15:13
  • Zuletzt bearbeitet 21.11.2024 04:27:15

In Valve Steam Client for Windows through 2019-08-07, HKLM\SOFTWARE\Wow6432Node\Valve\Steam has explicit "Full control" for the Users group, which allows local users to gain NT AUTHORITY\SYSTEM access.

  • EPSS 0.24%
  • Veröffentlicht 20.05.2019 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:44:53

In Valve Steam 1528829181 BETA, it is possible to perform a homograph / homoglyph attack to create fake URLs in the client, which may trick users into visiting unintended web sites.

  • EPSS 0.14%
  • Veröffentlicht 24.11.2015 20:59:16
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Valve Steam 2.10.91.91 uses weak permissions (Users: read and write) for the Install folder, which allows local users to gain privileges via a Trojan horse steam.exe file.

  • EPSS 1.17%
  • Veröffentlicht 20.05.2015 18:59:08
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The client detection protocol in Valve Steam allows remote attackers to cause a denial of service (process crash) via a crafted response to a broadcast packet.