Описание
Dokan, versions between 1.0.0.5000 and 1.2.0.1000, are vulnerable to a stack-based buffer overflow in the dokan1.sys driver. An attacker can create a device handle to the system driver and send arbitrary input that will trigger the vulnerability. This vulnerability was introduced in the 1.0.0.5000 version update.
Ссылки
- Third Party AdvisoryVDB Entry
- Third Party Advisory
- PatchThird Party Advisory
- Third Party AdvisoryUS Government Resource
- ExploitThird Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- Third Party Advisory
- PatchThird Party Advisory
- Third Party AdvisoryUS Government Resource
- ExploitThird Party AdvisoryVDB Entry
Уязвимые конфигурации
Конфигурация 1Версия от 1.0.0.5000 (включая) до 1.2.0.1000 (исключая)
cpe:2.3:a:dokan_project:dokan:*:*:*:*:*:*:*:*
EPSS
Процентиль: 76%
0.00984
Низкий
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
CWE-121
CWE-787
Связанные уязвимости
CVSS3: 7.8
github
больше 3 лет назад
Dokan, versions between 1.0.0.5000 and 1.2.0.1000, are vulnerable to a stack-based buffer overflow in the dokan1.sys driver. An attacker can create a device handle to the system driver and send arbitrary input that will trigger the vulnerability. This vulnerability was introduced in the 1.0.0.5000 version update.
EPSS
Процентиль: 76%
0.00984
Низкий
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
CWE-121
CWE-787