CERTA-2007-AVI-289
Vulnerability from certfr_avis
Une vulnérabilité dans Winpcap permet à un utilisateur local malintentionné d'exécuter du code arbitraire et d'élever ses privilèges.
Description
Un manque de contrôle dans la mise en œuvre d'un appel système fourni par le pilote NPF.SYS permet à un utilisateur local d'écraser des zones arbitraires de mémoire du noyau et potentiellement d'exécuter du code arbitraire en espace noyau via l'utilisation particulière de cet appel système.
Solution
La version 4.0.1 de Winpcap corrige le problème :
http://www.winpcap.org/install/default.htm
Winpcap version 4.0 et antérieures.
Impacted products
| Vendor | Product | Description |
|---|
References
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cTT\u003eWinpcap\u003c/TT\u003e version 4.0 et ant\u00e9rieures.",
"content": "## Description\n\nUn manque de contr\u00f4le dans la mise en \u0153uvre d\u0027un appel syst\u00e8me fourni\npar le pilote NPF.SYS permet \u00e0 un utilisateur local d\u0027\u00e9craser des zones\narbitraires de m\u00e9moire du noyau et potentiellement d\u0027ex\u00e9cuter du code\narbitraire en espace noyau via l\u0027utilisation particuli\u00e8re de cet appel\nsyst\u00e8me.\n\n## Solution\n\nLa version 4.0.1 de Winpcap corrige le probl\u00e8me :\n\n http://www.winpcap.org/install/default.htm\n",
"cves": [],
"initial_release_date": "2007-07-10T00:00:00",
"last_revision_date": "2007-07-10T00:00:00",
"links": [
{
"title": "Site de Winpcap :",
"url": "http://www.winpcap.org"
},
{
"title": "Liste des changements apport\u00e9s \u00e0 la version 4.0.1 :",
"url": "http://www.winpcap.org/misc/changelog.htm"
}
],
"reference": "CERTA-2007-AVI-289",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2007-07-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 dans Winpcap permet \u00e0 un utilisateur local\nmalintentionn\u00e9 d\u0027ex\u00e9cuter du code arbitraire et d\u0027\u00e9lever ses privil\u00e8ges.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Winpcap",
"vendor_advisories": [
{
"published_at": null,
"title": "Liste des changements apport\u00e9s \u00e0 la version 4.0.1 de winpcap",
"url": null
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…