A Use after Free vulnerability exists in IOBit Advanced SystemCare 15 pro via requests sent in sequential order using the IOCTL driver codes, which could let a malicious user execute arbitrary code or a Denial of Service (system crash). IOCTL list: iobit_ioctl = [0x8001e01c, 0x8001e020, 0x8001e024, 0x8001e040,0x8001e044, 0x8001e048, 0x8001e04c, 0x8001e000, 0x8001e004, 0x8001e008, 0x8001e00c, 0x8001e010, 0x8001e014, 0x8001e018]
References
Link | Resource |
---|---|
https://github.com/Quadron-Research-Lab/Kernel_Driver_bugs/tree/main/iobit_advenced_system_care | Exploit Third Party Advisory |
Configurations
History
01 Mar 2022, 00:51
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:iobit:advanced_systemcare:15:*:*:*:pro:*:*:* | |
References | (MISC) https://github.com/Quadron-Research-Lab/Kernel_Driver_bugs/tree/main/iobit_advenced_system_careĀ - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 7.2
v3 : 7.8 |
CWE | CWE-416 |
18 Feb 2022, 18:33
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-02-18 18:15
Updated : 2024-02-04 22:29
NVD link : CVE-2021-44968
Mitre link : CVE-2021-44968
CVE.ORG link : CVE-2021-44968
JSON object : View
Products Affected
iobit
- advanced_systemcare
CWE
CWE-416
Use After Free