CVE-2018-6856
https://notcve.org/view.php?id=CVE-2018-6856
Sophos SafeGuard Enterprise before 8.00.5, SafeGuard Easy before 7.00.3, and SafeGuard LAN Crypt before 3.95.2 are vulnerable to Local Privilege Escalation via IOCTL 0x8020601C. By crafting an input buffer we can control the execution path to the point where a global variable will be written to a user controlled address. We can take advantage of this condition to zero-out the pointer to the security descriptor in the object header of a privileged process or modify the security descriptor itself and run code in the context of a process running as SYSTEM. Sophos SafeGuard Enterprise en versiones anteriores a la 8.00.5, SafeGuard Easy en versiones anteriores a la 7.00.3, y SafeGuard LAN Crypt en versiones anteriores a la 3.95.2 son vulnerables a una escalada de privilegios local mediante IOCTL 0x8020601C. Manipulando un búfer de entrada, es posible controlar la ruta de ejecución al puntero, en el que se escribirá una variable global en una dirección controlada por el usuario. • http://seclists.org/fulldisclosure/2018/Jul/20 https://community.sophos.com/kb/en-us/131934 https://labs.nettitude.com/blog/cve-2018-6851-to-cve-2018-6857-sophos-privilege-escalation-vulnerabilities • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2018-6852
https://notcve.org/view.php?id=CVE-2018-6852
Sophos SafeGuard Enterprise before 8.00.5, SafeGuard Easy before 7.00.3, and SafeGuard LAN Crypt before 3.95.2 are vulnerable to Local Privilege Escalation via IOCTL 0x80202298. By crafting an input buffer we can control the execution path to the point where the nt!memset function is called to zero out contents of a user-controlled address. We can take advantage of this condition to zero-out the pointer to the security descriptor in the object header of a privileged process or modify the security descriptor itself and run code in the context of a process running as SYSTEM. Sophos SafeGuard Enterprise en versiones anteriores a la 8.00.5, SafeGuard Easy en versiones anteriores a la 7.00.3, y SafeGuard LAN Crypt en versiones anteriores a la 3.95.2 son vulnerables a una escalada de privilegios local mediante IOCTL 0x80202298. • http://seclists.org/fulldisclosure/2018/Jul/20 https://community.sophos.com/kb/en-us/131934 https://labs.nettitude.com/blog/cve-2018-6851-to-cve-2018-6857-sophos-privilege-escalation-vulnerabilities • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2012-4736
https://notcve.org/view.php?id=CVE-2012-4736
The Device Encryption Client component in Sophos SafeGuard Enterprise 6.0, when a volume-based encryption policy is enabled in conjunction with a user-defined key, does not properly block use of exFAT USB flash drives, which makes it easier for local users to bypass intended access restrictions and copy sensitive information to a drive via multiple removal and reattach operations. El componente Device Encryption Client en Sophos SafeGuard Enterprise 6.0 cuando una política de cifrado volume-based es habilitada en conjunción con una clave user-defined, no bloquea el acceso adecuadamente a dispositivos USB exFAT, lo que hace más fácil para usuarios locales evitar restricciones de acceso establecidas y copiar información sensible en un disco a través de múltiples operaciones de removal y reattach. • http://www.sophos.com/support/knowledgebase/1376/1380/114138.aspx https://exchange.xforce.ibmcloud.com/vulnerabilities/78580 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2011-5117
https://notcve.org/view.php?id=CVE-2011-5117
Sophos SafeGuard Enterprise Device Encryption 5.x through 5.50.8.13, Sophos SafeGuard Easy Device Encryption Client 5.50.x, and Sophos Disk Encryption 5.50.x have a delay before removal of (1) out-of-date credentials and (2) invalid credentials, which allows physically proximate attackers to defeat the full-disk encryption feature by leveraging knowledge of these credentials. Sophos SafeGuard Enterprise Device Encryption v5.x hasta v5.50.8.13, Sophos SafeGuard Easy Device Encryption Client v5.50.x, y Sophos Disk Encryption 5.50.x tienen cierto retraso antes de eliminar (1) credenciales antiguas y(2) credenciales inválidas, lo que podría permitir a atacantes físicamente próximos, conseguir vulnerar la función de cifrado del disco, aprovechando el conocimiento de estas credenciales. • http://www.sophos.com/en-us/support/knowledgebase/112655.aspx • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •