[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

IObit Malware Fighter 9.4.0.776 IOCTL ImfHpRegFilter.sys denial of service

Odkryto lukę w IObit Malware Fighter 9.4.0.776. Podatnością dotknięta jest funkcja 0x8001E000/0x8001E004/0x8001E018/0x8001E01C/0x8001E024/0x8001E040 w bibliotece ImfHpRegFilter.sys w komponencie IOCTL Handler. Poprzez manipulowanie przy użyciu nieznanych danych wejściowych można doprowadzić do wystąpienia podatności odmowa usługi. Raport na temat podatności został udostępniony pod adresem github.com. Podatność ta jest zwana CVE-2023-1643. Lokalny dostęp jest wymagany do tego ataku. Techniczne szczegóły są znane. Uważa się go za dowód koncepcji. Exploit można ściągnąć pod adresem drive.google.com.

4 Zmiany · 73 Punkty danych

PoleStworzono
2023-03-26 22:18
Update 1/3
2023-03-27 07:47
Update 2/3
2023-04-15 12:02
Update 3/3
2023-04-15 12:09
software_vendorIObitIObitIObitIObit
software_nameMalware FighterMalware FighterMalware FighterMalware Fighter
software_version9.4.0.7769.4.0.7769.4.0.7769.4.0.776
software_componentIOCTL HandlerIOCTL HandlerIOCTL HandlerIOCTL Handler
software_libraryImfHpRegFilter.sysImfHpRegFilter.sysImfHpRegFilter.sysImfHpRegFilter.sys
software_function0x8001E000/0x8001E004/0x8001E018/0x8001E01C/0x8001E024/0x8001E0400x8001E000/0x8001E004/0x8001E018/0x8001E01C/0x8001E024/0x8001E0400x8001E000/0x8001E004/0x8001E018/0x8001E01C/0x8001E024/0x8001E0400x8001E000/0x8001E004/0x8001E018/0x8001E01C/0x8001E024/0x8001E040
vulnerability_cweCWE-404 (odmowa usługi)CWE-404 (odmowa usługi)CWE-404 (odmowa usługi)CWE-404 (odmowa usługi)
vulnerability_risk1111
cvss3_vuldb_avLLLL
cvss3_vuldb_acLLLL
cvss3_vuldb_prLLLL
cvss3_vuldb_uiNNNN
cvss3_vuldb_sUUUU
cvss3_vuldb_cNNNN
cvss3_vuldb_iNNNN
cvss3_vuldb_aHHHH
cvss3_vuldb_ePPPP
cvss3_vuldb_rcRRRR
advisory_urlhttps://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned37https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1643https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1643https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1643
exploit_availability1111
exploit_publicity1111
exploit_urlhttps://drive.google.com/file/d/1dHdltwenfMdwAPeb3JPex0fHxfK_iLYh/viewhttps://drive.google.com/file/d/1dHdltwenfMdwAPeb3JPex0fHxfK_iLYh/viewhttps://drive.google.com/file/d/1dHdltwenfMdwAPeb3JPex0fHxfK_iLYh/viewhttps://drive.google.com/file/d/1dHdltwenfMdwAPeb3JPex0fHxfK_iLYh/view
source_cveCVE-2023-1643CVE-2023-1643CVE-2023-1643CVE-2023-1643
cna_responsibleVulDBVulDBVulDBVulDB
advisory_date1679785200 (2023-03-26)1679785200 (2023-03-26)1679785200 (2023-03-26)1679785200 (2023-03-26)
software_typeAnti-Malware SoftwareAnti-Malware SoftwareAnti-Malware SoftwareAnti-Malware Software
cvss2_vuldb_avLLLL
cvss2_vuldb_acLLLL
cvss2_vuldb_ciNNNN
cvss2_vuldb_iiNNNN
cvss2_vuldb_aiCCCC
cvss2_vuldb_ePOCPOCPOCPOC
cvss2_vuldb_rcURURURUR
cvss2_vuldb_auSSSS
cvss2_vuldb_rlNDNDNDND
cvss3_vuldb_rlXXXX
cvss2_vuldb_basescore4.64.64.64.6
cvss2_vuldb_tempscore3.93.93.93.9
cvss3_vuldb_basescore5.55.55.55.5
cvss3_vuldb_tempscore5.05.05.05.0
cvss3_meta_basescore5.55.55.55.5
cvss3_meta_tempscore5.05.05.05.3
price_0day$0-$5k$0-$5k$0-$5k$0-$5k
cve_assigned1679785200 (2023-03-26)1679785200 (2023-03-26)
cve_nvd_summaryA vulnerability has been found in IObit Malware Fighter 9.4.0.776 and classified as problematic. Affected by this vulnerability is the function 0x8001E000/0x8001E004/0x8001E018/0x8001E01C/0x8001E024/0x8001E040 in the library ImfHpRegFilter.sys of the component IOCTL Handler. The manipulation leads to denial of service. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224023.A vulnerability has been found in IObit Malware Fighter 9.4.0.776 and classified as problematic. Affected by this vulnerability is the function 0x8001E000/0x8001E004/0x8001E018/0x8001E01C/0x8001E024/0x8001E040 in the library ImfHpRegFilter.sys of the component IOCTL Handler. The manipulation leads to denial of service. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224023.
cvss3_nvd_avL
cvss3_nvd_acL
cvss3_nvd_prL
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cN
cvss3_nvd_iN
cvss3_nvd_aH
cvss2_nvd_avL
cvss2_nvd_acL
cvss2_nvd_auS
cvss2_nvd_ciN
cvss2_nvd_iiN
cvss2_nvd_aiC
cvss3_cna_avL
cvss3_cna_acL
cvss3_cna_prL
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cN
cvss3_cna_iN
cvss3_cna_aH
cve_cnaVulDB
cvss2_nvd_basescore4.6
cvss3_nvd_basescore5.5
cvss3_cna_basescore5.5

Do you know our Splunk app?

Download it now for free!