diff options
author | Mounir IDRASSI <mounir.idrassi@idrix.fr> | 2019-12-03 22:23:09 +0100 |
---|---|---|
committer | Mounir IDRASSI <mounir.idrassi@idrix.fr> | 2019-12-03 22:25:37 +0100 |
commit | ade8e3f8cbfd1143fcd2e4bfbd6c387b8b64f732 (patch) | |
tree | 264993f0118b8906d256e6341952bc39846bb176 /src/Common/Dlgcode.h | |
parent | c6ff31be1c2597c6545e3b1116b650f25e90cd8a (diff) | |
download | VeraCrypt-ade8e3f8cbfd1143fcd2e4bfbd6c387b8b64f732.tar.gz VeraCrypt-ade8e3f8cbfd1143fcd2e4bfbd6c387b8b64f732.zip |
Windows: Fix possible local privilege escalation vulnerability during execution of VeraCrypt Expander (CVE-2019-19501)
Diffstat (limited to 'src/Common/Dlgcode.h')
-rw-r--r-- | src/Common/Dlgcode.h | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/src/Common/Dlgcode.h b/src/Common/Dlgcode.h index ff45fef6..5da717fe 100644 --- a/src/Common/Dlgcode.h +++ b/src/Common/Dlgcode.h @@ -545,6 +545,7 @@ void GetInstallationPath (HWND hwndDlg, wchar_t* szInstallPath, DWORD cchSize, B BOOL GetSetupconfigLocation (wchar_t* path, DWORD cchSize); BOOL BufferHasPattern (const unsigned char* buffer, size_t bufferLen, const void* pattern, size_t patternLen); BOOL EnableProcessProtection(); +void SafeOpenURL (LPCWSTR szUrl); #ifdef _WIN64 void GetAppRandomSeed (unsigned char* pbRandSeed, size_t cbRandSeed); #endif |