Vulnerability Name: | CVE-2017-6007 (CCN-131918) | ||||||||||||
Assigned: | 2017-02-15 | ||||||||||||
Published: | 2017-02-15 | ||||||||||||
Updated: | 2017-09-21 | ||||||||||||
Summary: | A kernel pool overflow in the driver hitmanpro37.sys in Sophos SurfRight HitmanPro before 3.7.20 Build 286 (included in the HitmanPro.Alert solution and Sophos Clean) allows local users to crash the OS via a malformed IOCTL call. | ||||||||||||
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) 4.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
5.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 4.9 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C)
| ||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-6007 Source: XF Type: UNKNOWN sophos-cve20176007-dos(131918) Source: CCN Type: TrackWatch Web site Kernel Pool Overflow Exploitation In Real World Windows 10 Source: MISC Type: Exploit, Technical Description, Third Party Advisory https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-7/ Source: CCN Type: HitmanPro Web site HitmanPro.Alert Ransomware Prevention, Secondary Scanner and Zero-Day Exploit Protection | hitmanpro.com Source: MISC Type: Third Party Advisory https://www.nuitduhack.com/fr/planning/talk_10 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||
BACK |