| |
Vulnerability CVE-2017-16637
Published: 2017-11-06 Modified: 2017-11-07
Description: |
In Vectura Perfect Privacy VPN Manager v1.10.10 and v1.10.11, when resetting the network data via the software client, with a running VPN connection, a critical error occurs which leads to a "FrmAdvancedProtection" crash. Although the mechanism malfunctions and an error occurs during the runtime with the stack trace being issued, the software process is not properly terminated. The software client is still attempting to maintain the connection even though the network connection information is being reset live. In that insecure mode, the "FrmAdvancedProtection" component crashes, but the process continues to run with different errors and process corruptions. This local corruption vulnerability can be exploited by local attackers. |
Type:
CWE-20 (Improper Input Validation)
CVSS2 => (AV:L/AC:L/Au:N/C:N/I:N/A:P)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
2.1/10 |
2.9/10 |
3.9/10 |
Exploit range |
Attack complexity |
Authentication |
Local |
Low |
No required |
Confidentiality impact |
Integrity impact |
Availability impact |
None |
None |
Partial |
References: |
https://board.perfect-privacy.com/threads/reporting-a-security-bug-in-vpn-software-client-for-windows.2223/
https://www.vulnerability-lab.com/get_content.php?id=2102
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|