Stack-based buffer overflow in the K7Sentry.sys kernel mode driver (aka K7AV Sentry Device Driver) before 12.8.0.119, as used in multiple K7 Computing products, allows local users to execute arbitrary code with kernel privileges via unspecified vectors.
References
Configurations
History
21 Nov 2024, 02:20
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/129472/K7-Computing-Multiple-Products-K7Sentry.sys-Out-Of-Bounds-Write.html - Exploit | |
References | () http://seclists.org/fulldisclosure/2014/Dec/46 - Exploit | |
References | () https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-8956/ - Exploit |
Information
Published : 2014-12-12 15:59
Updated : 2024-11-21 02:20
NVD link : CVE-2014-8956
Mitre link : CVE-2014-8956
CVE.ORG link : CVE-2014-8956
JSON object : View
Products Affected
k7computing
- k7av_sentry_device_driver
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer