Search criteria
8 vulnerabilities found for HitmanPro by Sophos
CVE-2021-25271 (GCVE-0-2021-25271)
Vulnerability from nvd – Published: 2021-10-07 23:11 – Updated: 2024-08-03 19:56
VLAI?
Summary
A local attacker could read or write arbitrary files with administrator privileges in HitmanPro before version Build 318.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Credits
Michael Bourque (@downwithupsec)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T19:56:11.132Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20211007-hmp-lpe"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "HitmanPro",
"vendor": "Sophos",
"versions": [
{
"lessThan": "318",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Michael Bourque (@downwithupsec)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A local attacker could read or write arbitrary files with administrator privileges in HitmanPro before version Build 318."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-10-07T23:11:54",
"orgId": "526a354d-e866-4174-ae7d-bac848e5c4c5",
"shortName": "Sophos"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20211007-hmp-lpe"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security-alert@sophos.com",
"ID": "CVE-2021-25271",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "HitmanPro",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "318"
}
]
}
}
]
},
"vendor_name": "Sophos"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Michael Bourque (@downwithupsec)"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A local attacker could read or write arbitrary files with administrator privileges in HitmanPro before version Build 318."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20211007-hmp-lpe",
"refsource": "CONFIRM",
"url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20211007-hmp-lpe"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "526a354d-e866-4174-ae7d-bac848e5c4c5",
"assignerShortName": "Sophos",
"cveId": "CVE-2021-25271",
"datePublished": "2021-10-07T23:11:54",
"dateReserved": "2021-01-15T00:00:00",
"dateUpdated": "2024-08-03T19:56:11.132Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2017-7441 (GCVE-0-2017-7441)
Vulnerability from nvd – Published: 2017-09-13 08:00 – Updated: 2024-08-05 16:04
VLAI?
Summary
In Sophos SurfRight HitmanPro before 3.7.20 Build 286 (included in the HitmanPro.Alert solution and Sophos Clean), a crafted IOCTL with code 0x22E1C0 might lead to kernel data leaks. Because the leak occurs at the driver level, an attacker can use this vulnerability to leak some critical information about the machine such as nt!ExpPoolQuotaCookie.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T16:04:11.387Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.nuitduhack.com/fr/planning/talk_10"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-10/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2017-09-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "In Sophos SurfRight HitmanPro before 3.7.20 Build 286 (included in the HitmanPro.Alert solution and Sophos Clean), a crafted IOCTL with code 0x22E1C0 might lead to kernel data leaks. Because the leak occurs at the driver level, an attacker can use this vulnerability to leak some critical information about the machine such as nt!ExpPoolQuotaCookie."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-13T07:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.nuitduhack.com/fr/planning/talk_10"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-10/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-7441",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Sophos SurfRight HitmanPro before 3.7.20 Build 286 (included in the HitmanPro.Alert solution and Sophos Clean), a crafted IOCTL with code 0x22E1C0 might lead to kernel data leaks. Because the leak occurs at the driver level, an attacker can use this vulnerability to leak some critical information about the machine such as nt!ExpPoolQuotaCookie."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.nuitduhack.com/fr/planning/talk_10",
"refsource": "MISC",
"url": "https://www.nuitduhack.com/fr/planning/talk_10"
},
{
"name": "https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-10/",
"refsource": "MISC",
"url": "https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-10/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2017-7441",
"datePublished": "2017-09-13T08:00:00",
"dateReserved": "2017-04-05T00:00:00",
"dateUpdated": "2024-08-05T16:04:11.387Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2017-6008 (GCVE-0-2017-6008)
Vulnerability from nvd – Published: 2017-09-13 08:00 – Updated: 2024-08-05 15:18
VLAI?
Summary
A kernel pool overflow in the driver hitmanpro37.sys in Sophos SurfRight HitmanPro before 3.7.20 Build 286 (included in the HitmanPro.Alert solution and Sophos Clean) allows local users to escalate privileges via a malformed IOCTL call.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T15:18:49.374Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-7/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.nuitduhack.com/fr/planning/talk_10"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-10/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/cbayet/Exploit-CVE-2017-6008"
},
{
"name": "43057",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/43057/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2017-09-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A kernel pool overflow in the driver hitmanpro37.sys in Sophos SurfRight HitmanPro before 3.7.20 Build 286 (included in the HitmanPro.Alert solution and Sophos Clean) allows local users to escalate privileges via a malformed IOCTL call."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-10-28T09:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-7/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.nuitduhack.com/fr/planning/talk_10"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-10/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/cbayet/Exploit-CVE-2017-6008"
},
{
"name": "43057",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/43057/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-6008",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A kernel pool overflow in the driver hitmanpro37.sys in Sophos SurfRight HitmanPro before 3.7.20 Build 286 (included in the HitmanPro.Alert solution and Sophos Clean) allows local users to escalate privileges via a malformed IOCTL call."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-7/",
"refsource": "MISC",
"url": "https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-7/"
},
{
"name": "https://www.nuitduhack.com/fr/planning/talk_10",
"refsource": "MISC",
"url": "https://www.nuitduhack.com/fr/planning/talk_10"
},
{
"name": "https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-10/",
"refsource": "MISC",
"url": "https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-10/"
},
{
"name": "https://github.com/cbayet/Exploit-CVE-2017-6008",
"refsource": "MISC",
"url": "https://github.com/cbayet/Exploit-CVE-2017-6008"
},
{
"name": "43057",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/43057/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2017-6008",
"datePublished": "2017-09-13T08:00:00",
"dateReserved": "2017-02-15T00:00:00",
"dateUpdated": "2024-08-05T15:18:49.374Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2017-6007 (GCVE-0-2017-6007)
Vulnerability from nvd – Published: 2017-09-13 08:00 – Updated: 2024-08-05 15:18
VLAI?
Summary
A kernel pool overflow in the driver hitmanpro37.sys in Sophos SurfRight HitmanPro before 3.7.20 Build 286 (included in the HitmanPro.Alert solution and Sophos Clean) allows local users to crash the OS via a malformed IOCTL call.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T15:18:49.456Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-7/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.nuitduhack.com/fr/planning/talk_10"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2017-09-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A kernel pool overflow in the driver hitmanpro37.sys in Sophos SurfRight HitmanPro before 3.7.20 Build 286 (included in the HitmanPro.Alert solution and Sophos Clean) allows local users to crash the OS via a malformed IOCTL call."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-13T07:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-7/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.nuitduhack.com/fr/planning/talk_10"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-6007",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A kernel pool overflow in the driver hitmanpro37.sys in Sophos SurfRight HitmanPro before 3.7.20 Build 286 (included in the HitmanPro.Alert solution and Sophos Clean) allows local users to crash the OS via a malformed IOCTL call."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-7/",
"refsource": "MISC",
"url": "https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-7/"
},
{
"name": "https://www.nuitduhack.com/fr/planning/talk_10",
"refsource": "MISC",
"url": "https://www.nuitduhack.com/fr/planning/talk_10"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2017-6007",
"datePublished": "2017-09-13T08:00:00",
"dateReserved": "2017-02-15T00:00:00",
"dateUpdated": "2024-08-05T15:18:49.456Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-25271 (GCVE-0-2021-25271)
Vulnerability from cvelistv5 – Published: 2021-10-07 23:11 – Updated: 2024-08-03 19:56
VLAI?
Summary
A local attacker could read or write arbitrary files with administrator privileges in HitmanPro before version Build 318.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Credits
Michael Bourque (@downwithupsec)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T19:56:11.132Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20211007-hmp-lpe"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "HitmanPro",
"vendor": "Sophos",
"versions": [
{
"lessThan": "318",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Michael Bourque (@downwithupsec)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A local attacker could read or write arbitrary files with administrator privileges in HitmanPro before version Build 318."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-10-07T23:11:54",
"orgId": "526a354d-e866-4174-ae7d-bac848e5c4c5",
"shortName": "Sophos"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20211007-hmp-lpe"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security-alert@sophos.com",
"ID": "CVE-2021-25271",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "HitmanPro",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "318"
}
]
}
}
]
},
"vendor_name": "Sophos"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Michael Bourque (@downwithupsec)"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A local attacker could read or write arbitrary files with administrator privileges in HitmanPro before version Build 318."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20211007-hmp-lpe",
"refsource": "CONFIRM",
"url": "https://www.sophos.com/en-us/security-advisories/sophos-sa-20211007-hmp-lpe"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "526a354d-e866-4174-ae7d-bac848e5c4c5",
"assignerShortName": "Sophos",
"cveId": "CVE-2021-25271",
"datePublished": "2021-10-07T23:11:54",
"dateReserved": "2021-01-15T00:00:00",
"dateUpdated": "2024-08-03T19:56:11.132Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2017-6008 (GCVE-0-2017-6008)
Vulnerability from cvelistv5 – Published: 2017-09-13 08:00 – Updated: 2024-08-05 15:18
VLAI?
Summary
A kernel pool overflow in the driver hitmanpro37.sys in Sophos SurfRight HitmanPro before 3.7.20 Build 286 (included in the HitmanPro.Alert solution and Sophos Clean) allows local users to escalate privileges via a malformed IOCTL call.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T15:18:49.374Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-7/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.nuitduhack.com/fr/planning/talk_10"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-10/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/cbayet/Exploit-CVE-2017-6008"
},
{
"name": "43057",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/43057/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2017-09-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A kernel pool overflow in the driver hitmanpro37.sys in Sophos SurfRight HitmanPro before 3.7.20 Build 286 (included in the HitmanPro.Alert solution and Sophos Clean) allows local users to escalate privileges via a malformed IOCTL call."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-10-28T09:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-7/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.nuitduhack.com/fr/planning/talk_10"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-10/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/cbayet/Exploit-CVE-2017-6008"
},
{
"name": "43057",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/43057/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-6008",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A kernel pool overflow in the driver hitmanpro37.sys in Sophos SurfRight HitmanPro before 3.7.20 Build 286 (included in the HitmanPro.Alert solution and Sophos Clean) allows local users to escalate privileges via a malformed IOCTL call."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-7/",
"refsource": "MISC",
"url": "https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-7/"
},
{
"name": "https://www.nuitduhack.com/fr/planning/talk_10",
"refsource": "MISC",
"url": "https://www.nuitduhack.com/fr/planning/talk_10"
},
{
"name": "https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-10/",
"refsource": "MISC",
"url": "https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-10/"
},
{
"name": "https://github.com/cbayet/Exploit-CVE-2017-6008",
"refsource": "MISC",
"url": "https://github.com/cbayet/Exploit-CVE-2017-6008"
},
{
"name": "43057",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/43057/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2017-6008",
"datePublished": "2017-09-13T08:00:00",
"dateReserved": "2017-02-15T00:00:00",
"dateUpdated": "2024-08-05T15:18:49.374Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2017-7441 (GCVE-0-2017-7441)
Vulnerability from cvelistv5 – Published: 2017-09-13 08:00 – Updated: 2024-08-05 16:04
VLAI?
Summary
In Sophos SurfRight HitmanPro before 3.7.20 Build 286 (included in the HitmanPro.Alert solution and Sophos Clean), a crafted IOCTL with code 0x22E1C0 might lead to kernel data leaks. Because the leak occurs at the driver level, an attacker can use this vulnerability to leak some critical information about the machine such as nt!ExpPoolQuotaCookie.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T16:04:11.387Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.nuitduhack.com/fr/planning/talk_10"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-10/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2017-09-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "In Sophos SurfRight HitmanPro before 3.7.20 Build 286 (included in the HitmanPro.Alert solution and Sophos Clean), a crafted IOCTL with code 0x22E1C0 might lead to kernel data leaks. Because the leak occurs at the driver level, an attacker can use this vulnerability to leak some critical information about the machine such as nt!ExpPoolQuotaCookie."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-13T07:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.nuitduhack.com/fr/planning/talk_10"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-10/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-7441",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Sophos SurfRight HitmanPro before 3.7.20 Build 286 (included in the HitmanPro.Alert solution and Sophos Clean), a crafted IOCTL with code 0x22E1C0 might lead to kernel data leaks. Because the leak occurs at the driver level, an attacker can use this vulnerability to leak some critical information about the machine such as nt!ExpPoolQuotaCookie."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.nuitduhack.com/fr/planning/talk_10",
"refsource": "MISC",
"url": "https://www.nuitduhack.com/fr/planning/talk_10"
},
{
"name": "https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-10/",
"refsource": "MISC",
"url": "https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-10/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2017-7441",
"datePublished": "2017-09-13T08:00:00",
"dateReserved": "2017-04-05T00:00:00",
"dateUpdated": "2024-08-05T16:04:11.387Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2017-6007 (GCVE-0-2017-6007)
Vulnerability from cvelistv5 – Published: 2017-09-13 08:00 – Updated: 2024-08-05 15:18
VLAI?
Summary
A kernel pool overflow in the driver hitmanpro37.sys in Sophos SurfRight HitmanPro before 3.7.20 Build 286 (included in the HitmanPro.Alert solution and Sophos Clean) allows local users to crash the OS via a malformed IOCTL call.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T15:18:49.456Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-7/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.nuitduhack.com/fr/planning/talk_10"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2017-09-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A kernel pool overflow in the driver hitmanpro37.sys in Sophos SurfRight HitmanPro before 3.7.20 Build 286 (included in the HitmanPro.Alert solution and Sophos Clean) allows local users to crash the OS via a malformed IOCTL call."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-13T07:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-7/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.nuitduhack.com/fr/planning/talk_10"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-6007",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A kernel pool overflow in the driver hitmanpro37.sys in Sophos SurfRight HitmanPro before 3.7.20 Build 286 (included in the HitmanPro.Alert solution and Sophos Clean) allows local users to crash the OS via a malformed IOCTL call."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-7/",
"refsource": "MISC",
"url": "https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-7/"
},
{
"name": "https://www.nuitduhack.com/fr/planning/talk_10",
"refsource": "MISC",
"url": "https://www.nuitduhack.com/fr/planning/talk_10"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2017-6007",
"datePublished": "2017-09-13T08:00:00",
"dateReserved": "2017-02-15T00:00:00",
"dateUpdated": "2024-08-05T15:18:49.456Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}