[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

DriverGenius 9.70.0.346 IOCTL mydrivers64.sys 0x9C402088 buffer overflow

Une vulnérabilité qui a été classée critique a été trouvée dans DriverGenius 9.70.0.346. Affecté par cette vulnérabilité est la fonction 0x9C402088 dans la bibliothèque mydrivers64.sys du composant IOCTL Handler. A cause de la manipulation avec une valeur d'entrée inconnue mène à une vulnérabilité de classe buffer overflow. La notice d'information est disponible en téléchargement sur github.com. Cette vulnérabilité est connue comme CVE-2023-1676. Un accés local est requis pour cette attaque. Des details techniques sont connus. Il est déclaré comme preuve de concept. L'exploit est disponible au téléchargment sur drive.google.com.

4 Changements · 72 Points de données

DomaineÉtabli
28/03/2023 22:21
Update 1/3
30/03/2023 10:15
Update 2/3
16/04/2023 13:42
Update 3/3
16/04/2023 13:48
software_version9.70.0.3469.70.0.3469.70.0.3469.70.0.346
software_componentIOCTL HandlerIOCTL HandlerIOCTL HandlerIOCTL Handler
software_librarymydrivers64.sysmydrivers64.sysmydrivers64.sysmydrivers64.sys
software_function0x9C4020880x9C4020880x9C4020880x9C402088
vulnerability_cweCWE-119 (buffer overflow)CWE-119 (buffer overflow)CWE-119 (buffer overflow)CWE-119 (buffer overflow)
vulnerability_risk2222
cvss3_vuldb_avLLLL
cvss3_vuldb_acLLLL
cvss3_vuldb_prLLLL
cvss3_vuldb_uiNNNN
cvss3_vuldb_sUUUU
cvss3_vuldb_cHHHH
cvss3_vuldb_iHHHH
cvss3_vuldb_aHHHH
cvss3_vuldb_ePPPP
cvss3_vuldb_rcRRRR
advisory_urlhttps://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned27https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1676https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1676https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1676
exploit_availability1111
exploit_publicity1111
exploit_urlhttps://drive.google.com/file/d/1kYCec3kYCzD9s2Vnclp_aW5jLneWqHC_/viewhttps://drive.google.com/file/d/1kYCec3kYCzD9s2Vnclp_aW5jLneWqHC_/viewhttps://drive.google.com/file/d/1kYCec3kYCzD9s2Vnclp_aW5jLneWqHC_/viewhttps://drive.google.com/file/d/1kYCec3kYCzD9s2Vnclp_aW5jLneWqHC_/view
source_cveCVE-2023-1676CVE-2023-1676CVE-2023-1676CVE-2023-1676
cna_responsibleVulDBVulDBVulDBVulDB
advisory_date1679954400 (28/03/2023)1679954400 (28/03/2023)1679954400 (28/03/2023)1679954400 (28/03/2023)
software_typeHardware Driver SoftwareHardware Driver SoftwareHardware Driver SoftwareHardware Driver Software
cvss2_vuldb_avLLLL
cvss2_vuldb_acLLLL
cvss2_vuldb_ciCCCC
cvss2_vuldb_iiCCCC
cvss2_vuldb_aiCCCC
cvss2_vuldb_ePOCPOCPOCPOC
cvss2_vuldb_rcURURURUR
cvss2_vuldb_auSSSS
cvss2_vuldb_rlNDNDNDND
cvss3_vuldb_rlXXXX
cvss2_vuldb_basescore6.86.86.86.8
cvss2_vuldb_tempscore5.85.85.85.8
cvss3_vuldb_basescore7.87.87.87.8
cvss3_vuldb_tempscore7.17.17.17.1
cvss3_meta_basescore7.87.87.87.8
cvss3_meta_tempscore7.17.17.17.6
price_0day$0-$5k$0-$5k$0-$5k$0-$5k
software_nameDriverGeniusDriverGeniusDriverGeniusDriverGenius
cve_assigned1679954400 (28/03/2023)1679954400 (28/03/2023)
cve_nvd_summaryA vulnerability was found in DriverGenius 9.70.0.346. It has been declared as critical. Affected by this vulnerability is the function 0x9C402088 in the library mydrivers64.sys of the component IOCTL Handler. The manipulation leads to memory corruption. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The identifier VDB-224233 was assigned to this vulnerability.A vulnerability was found in DriverGenius 9.70.0.346. It has been declared as critical. Affected by this vulnerability is the function 0x9C402088 in the library mydrivers64.sys of the component IOCTL Handler. The manipulation leads to memory corruption. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The identifier VDB-224233 was assigned to this vulnerability.
cvss3_nvd_avL
cvss3_nvd_acL
cvss3_nvd_prL
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cH
cvss3_nvd_iH
cvss3_nvd_aH
cvss2_nvd_avL
cvss2_nvd_acL
cvss2_nvd_auS
cvss2_nvd_ciC
cvss2_nvd_iiC
cvss2_nvd_aiC
cvss3_cna_avL
cvss3_cna_acL
cvss3_cna_prL
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cH
cvss3_cna_iH
cvss3_cna_aH
cve_cnaVulDB
cvss2_nvd_basescore6.8
cvss3_nvd_basescore7.8
cvss3_cna_basescore7.8

Do you want to use VulDB in your project?

Use the official API to access entries easily!