Vulnerability CVE-2014-7136


Published: 2014-12-12

Description:
Heap-based buffer overflow in the K7FWFilt.sys kernel mode driver (aka K7Firewall Packet Driver) before 14.0.1.16, as used in multiple K7 Computing products, allows local users to execute arbitrary code with kernel privileges via a crafted parameter in a DeviceIoControl API call.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
K7 Computing Multiple Products K7FWFilt.sys Privilege Escalation
Kyriakos Economo...
11.12.2014

Type:

CWE-119

(Improper Restriction of Operations within the Bounds of a Memory Buffer)

CVSS2 => (AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.2/10
10/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
K7computing -> K7firewall packet driver 

 References:
https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-7136/
http://seclists.org/fulldisclosure/2014/Dec/47
http://packetstormsecurity.com/files/129474/K7-Computing-Multiple-Products-K7FWFilt.sys-Privilege-Escalation.html

Copyright 2024, cxsecurity.com

 

Back to Top