Vulnerability Name: | CVE-2017-7441 (CCN-131916) | ||||||||||||
Assigned: | 2017-04-05 | ||||||||||||
Published: | 2017-04-05 | ||||||||||||
Updated: | 2017-09-26 | ||||||||||||
Summary: | In Sophos SurfRight HitmanPro before 3.7.20 Build 286 (included in the HitmanPro.Alert solution and Sophos Clean), a crafted IOCTL with code 0x22E1C0 might lead to kernel data leaks. Because the leak occurs at the driver level, an attacker can use this vulnerability to leak some critical information about the machine such as nt!ExpPoolQuotaCookie. | ||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-7441 Source: XF Type: UNKNOWN sophos-cve20177441-info-disc(131916) Source: CCN Type: TrackWatch Web site Kernel Pool Overflow Exploitation In Real World Windows 10 Source: MISC Type: Exploit, Mitigation, Third Party Advisory https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-10/ Source: CCN Type: HitmanPro Web site HitmanPro.Alert Ransomware Prevention, Secondary Scanner and Zero-Day Exploit Protection | hitmanpro.com Source: MISC Type: Third Party Advisory https://www.nuitduhack.com/fr/planning/talk_10 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||
BACK |