CVE-2014-8956

Stack-based buffer overflow in the K7Sentry.sys kernel mode driver (aka K7AV Sentry Device Driver) before 12.8.0.119, as used in multiple K7 Computing products, allows local users to execute arbitrary code with kernel privileges via unspecified vectors.
Configurations

Configuration 1 (hide)

cpe:2.3:a:k7computing:k7av_sentry_device_driver:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:20

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/129472/K7-Computing-Multiple-Products-K7Sentry.sys-Out-Of-Bounds-Write.html - Exploit () http://packetstormsecurity.com/files/129472/K7-Computing-Multiple-Products-K7Sentry.sys-Out-Of-Bounds-Write.html - Exploit
References () http://seclists.org/fulldisclosure/2014/Dec/46 - Exploit () http://seclists.org/fulldisclosure/2014/Dec/46 - Exploit
References () https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-8956/ - Exploit () https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-8956/ - Exploit

Information

Published : 2014-12-12 15:59

Updated : 2024-11-21 02:20


NVD link : CVE-2014-8956

Mitre link : CVE-2014-8956

CVE.ORG link : CVE-2014-8956


JSON object : View

Products Affected

k7computing

  • k7av_sentry_device_driver
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer