Vulnerabilities > CVE-2018-5410 - Out-of-bounds Write vulnerability in Dokan Project Dokan
Attack vector
LOCAL Attack complexity
LOW Privileges required
LOW Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
Dokan, versions between 1.0.0.5000 and 1.2.0.1000, are vulnerable to a stack-based buffer overflow in the dokan1.sys driver. An attacker can create a device handle to the system driver and send arbitrary input that will trigger the vulnerability. This vulnerability was introduced in the 1.0.0.5000 version update.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 8 |
Common Weakness Enumeration (CWE)
Exploit-Db
file | exploits/windows/local/46155.c |
id | EDB-ID:46155 |
last seen | 2019-01-14 |
modified | 2019-01-14 |
platform | windows |
port | |
published | 2019-01-14 |
reporter | Exploit-DB |
source | https://www.exploit-db.com/download/46155 |
title | Dokany 1.2.0.1000 - Stack-Based Buffer Overflow Privilege Escalation |
type | local |
Packetstorm
data source | https://packetstormsecurity.com/files/download/151125/dokany12-overflow.txt |
id | PACKETSTORM:151125 |
last seen | 2019-01-15 |
published | 2019-01-14 |
reporter | Parvez Anwar |
source | https://packetstormsecurity.com/files/151125/Dokany-1.2.0.1000-Buffer-Overflow-Privilege-Escalation.html |
title | Dokany 1.2.0.1000 Buffer Overflow / Privilege Escalation |
References
- http://www.securityfocus.com/bid/106274
- http://www.securityfocus.com/bid/106274
- https://cwe.mitre.org/data/definitions/121.html
- https://cwe.mitre.org/data/definitions/121.html
- https://github.com/dokan-dev/dokany/releases/tag/v1.2.1.1000
- https://github.com/dokan-dev/dokany/releases/tag/v1.2.1.1000
- https://kb.cert.org/vuls/id/741315/
- https://kb.cert.org/vuls/id/741315/
- https://www.exploit-db.com/exploits/46155/
- https://www.exploit-db.com/exploits/46155/