VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Common/Dlgcode.h
diff options
context:
space:
mode:
authorMounir IDRASSI <mounir.idrassi@idrix.fr>2019-12-03 22:23:09 +0100
committerMounir IDRASSI <mounir.idrassi@idrix.fr>2019-12-03 22:25:37 +0100
commitade8e3f8cbfd1143fcd2e4bfbd6c387b8b64f732 (patch)
tree264993f0118b8906d256e6341952bc39846bb176 /src/Common/Dlgcode.h
parentc6ff31be1c2597c6545e3b1116b650f25e90cd8a (diff)
downloadVeraCrypt-ade8e3f8cbfd1143fcd2e4bfbd6c387b8b64f732.tar.gz
VeraCrypt-ade8e3f8cbfd1143fcd2e4bfbd6c387b8b64f732.zip
Windows: Fix possible local privilege escalation vulnerability during execution of VeraCrypt Expander (CVE-2019-19501)
Diffstat (limited to 'src/Common/Dlgcode.h')
-rw-r--r--src/Common/Dlgcode.h1
1 files changed, 1 insertions, 0 deletions
diff --git a/src/Common/Dlgcode.h b/src/Common/Dlgcode.h
index ff45fef6..5da717fe 100644
--- a/src/Common/Dlgcode.h
+++ b/src/Common/Dlgcode.h
@@ -545,6 +545,7 @@ void GetInstallationPath (HWND hwndDlg, wchar_t* szInstallPath, DWORD cchSize, B
BOOL GetSetupconfigLocation (wchar_t* path, DWORD cchSize);
BOOL BufferHasPattern (const unsigned char* buffer, size_t bufferLen, const void* pattern, size_t patternLen);
BOOL EnableProcessProtection();
+void SafeOpenURL (LPCWSTR szUrl);
#ifdef _WIN64
void GetAppRandomSeed (unsigned char* pbRandSeed, size_t cbRandSeed);
#endif