In CPUID CPU-Z through 1.81, there are improper access rights to a kernel-mode driver (e.g., cpuz143_x64.sys for version 1.43) that can result in information disclosure or elevation of privileges, because of an arbitrary read of any physical address via ioctl 0x9C402604. Any application running on the system (Windows), including sandboxed users, can issue an ioctl to this driver without any validation. Furthermore, the driver can map any physical page on the system and returns the allocated map page address to the user: that results in an information leak and EoP. NOTE: the vendor indicates that the arbitrary read itself is intentional behavior (for ACPI scan functionality); the security issue is the lack of an ACL.
References
Link | Resource |
---|---|
https://github.com/akayn/Bugs/blob/master/CPUID/CVE-2017-15302/README.md | Third Party Advisory |
https://github.com/akayn/Bugs/blob/master/CPUID/CVE-2017-15302/README.md | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:14
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/akayn/Bugs/blob/master/CPUID/CVE-2017-15302/README.md - Third Party Advisory |
Information
Published : 2017-10-16 01:29
Updated : 2024-11-21 03:14
NVD link : CVE-2017-15302
Mitre link : CVE-2017-15302
CVE.ORG link : CVE-2017-15302
JSON object : View
Products Affected
cpuid
- cpu-z
CWE