Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6xcc-8jcr-hfj7

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 7.1

Описание

In K7 Total Security before 15.1.0.305, user-controlled input to the K7Sentry device is not sufficiently sanitized: the user-controlled input can be used to compare an arbitrary memory address with a fixed value, which in turn can be used to read the contents of arbitrary memory. Similarly, the product crashes upon a \.\K7Sentry DeviceIoControl call with an invalid kernel pointer.

In K7 Total Security before 15.1.0.305, user-controlled input to the K7Sentry device is not sufficiently sanitized: the user-controlled input can be used to compare an arbitrary memory address with a fixed value, which in turn can be used to read the contents of arbitrary memory. Similarly, the product crashes upon a \.\K7Sentry DeviceIoControl call with an invalid kernel pointer.

EPSS

Процентиль: 80%
0.0143
Низкий

7.1 High

CVSS3

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 7.1
nvd
около 8 лет назад

In K7 Total Security before 15.1.0.305, user-controlled input to the K7Sentry device is not sufficiently sanitized: the user-controlled input can be used to compare an arbitrary memory address with a fixed value, which in turn can be used to read the contents of arbitrary memory. Similarly, the product crashes upon a \\.\K7Sentry DeviceIoControl call with an invalid kernel pointer.

EPSS

Процентиль: 80%
0.0143
Низкий

7.1 High

CVSS3

Дефекты

CWE-20