An exploitable pool corruption vulnerability exists in the 0x8200E804 IOCTL handler functionality of WIBU-SYSTEMS WibuKey.sys Version 6.40 (Build 2400). A specially crafted IRP request can cause a buffer overflow, resulting in kernel memory corruption and, potentially, privilege escalation. An attacker can send an IRP request to trigger this vulnerability.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/107005 | VDB Entry Third Party Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-760124.pdf | Third Party Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-844562.pdf | Third Party Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-902727.pdf | |
https://talosintelligence.com/vulnerability_reports/TALOS-2018-0658 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2019-02-05 23:29
Updated : 2024-02-04 20:03
NVD link : CVE-2018-3990
Mitre link : CVE-2018-3990
CVE.ORG link : CVE-2018-3990
JSON object : View
Products Affected
microsoft
- windows
wibu
- wibukey
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer