Page 15 of 161 results (0.008 seconds)

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 1

A kernel pool overflow in the driver hitmanpro37.sys in Sophos SurfRight HitmanPro before 3.7.20 Build 286 (included in the HitmanPro.Alert solution and Sophos Clean) allows local users to crash the OS via a malformed IOCTL call. Un desbordamiento de espacio de memoria del kernel en el controlador hitmanpro37.sys en Sophos SurfRight HitmanPro en versiones anteriores a la 3.7.20 Build 286 (incluido en la solución HitmanPro.Alert y Sophos Clean) permite que usuarios remotos provoquen el cierre inesperado del sistema operativo mediante una llamada IOCTL mal formada. • https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-7 https://www.nuitduhack.com/fr/planning/talk_10 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 4

A kernel pool overflow in the driver hitmanpro37.sys in Sophos SurfRight HitmanPro before 3.7.20 Build 286 (included in the HitmanPro.Alert solution and Sophos Clean) allows local users to escalate privileges via a malformed IOCTL call. Un desbordamiento de espacio de memoria del kernel en el controlador hitmanpro37.sys en Sophos SurfRight HitmanPro en versiones anteriores a la 3.7.20 Build 286 (incluido en la solución HitmanPro.Alert y Sophos Clean) permite que usuarios remotos escalen privilegios mediante una llamada IOCTL mal formada. • https://www.exploit-db.com/exploits/43057 https://github.com/cbayet/Exploit-CVE-2017-6008 https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-10 https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-7 https://www.nuitduhack.com/fr/planning/talk_10 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

In Sophos SurfRight HitmanPro before 3.7.20 Build 286 (included in the HitmanPro.Alert solution and Sophos Clean), a crafted IOCTL with code 0x22E1C0 might lead to kernel data leaks. Because the leak occurs at the driver level, an attacker can use this vulnerability to leak some critical information about the machine such as nt!ExpPoolQuotaCookie. En Sophos SurfRight HitmanPro en versiones anteriores a 3.7.20 Build 286 (incluido en la solución HitmanPro.Alert y Sophos Clean), un IOCTL manipulado con código 0x22E1C0 podría conducir a fugas de datos del kernel. Debido a que la fuga ocurre a nivel de controlador, un atacante puede emplear esta vulnerabilidad para filtrar información crítica sobre la máquina, como por ejemplo nt! • https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-10 https://www.nuitduhack.com/fr/planning/talk_10 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 3%CPEs: 2EXPL: 1

A VMSF_DELTA memory corruption was discovered in unrar before 5.5.5, as used in Sophos Anti-Virus Threat Detection Engine before 3.37.2 and other products, that can lead to arbitrary code execution. An integer overflow can be caused in DataSize+CurChannel. The result is a negative value of the "DestPos" variable, which allows the attacker to write out of bounds when setting Mem[DestPos]. Una corrupción de memoria VMSF_DELTA descubierta en unrar versiones anteriores a 5.5.5, utilizada en Sophos Anti-Virus Threat Detection Engine versiones anteriores a 3.37.2 y otros productos, puede permitir la ejecución de código arbitrario. Un desbordamiento de enteros puede producirse en DataSize + CurChannel. • http://securitytracker.com/id?1027725 http://telussecuritylabs.com/threats/show/TSL20121207-01 https://bugs.chromium.org/p/project-zero/issues/detail?id=1286 https://community.sophos.com/kb/en-us/118424#six https://kc.mcafee.com/corporate/index?page=content&id=SB10205 https://lock.cmpxchg8b.com/sophailv2.pdf https://nakedsecurity.sophos.com/2012/11/05/tavis-ormandy-sophos https://security.gentoo.org/glsa/201708-05 https://security.gentoo.org/glsa/201709-24 https://security.gent • CWE-190: Integer Overflow or Wraparound •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

The Sophos Web Appliance before 4.3.2 has XSS in the FTP redirect page, aka NSWA-1342. El producto Sophos Web Appliance versiones anteriores a 4.3.2, presenta un problema de tipo XSS en la página de redireccionamiento FTP, también se conoce como NSWA-1342. • http://swa.sophos.com/rn/swa/concepts/ReleaseNotes_4.3.2.html http://www.securityfocus.com/bid/99016 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •