An issue was discovered in PassMark BurnInTest through 9.1, OSForensics through 7.1, and PerformanceTest through 10. The driver's IOCTL request handler attempts to copy the input buffer onto the stack without checking its size and can cause a buffer overflow. This could lead to arbitrary Ring-0 code execution and escalation of privileges. This affects DirectIo32.sys and DirectIo64.sys.
References
Link | Resource |
---|---|
https://github.com/eset/vulnerability-disclosures | Third Party Advisory |
https://github.com/eset/vulnerability-disclosures/blob/master/CVE-2020-15479/CVE-2020-15479.md | Exploit Third Party Advisory |
https://www.passmark.com/forum/index.php | Vendor Advisory |
https://www.passmark.com/support/index.php | Vendor Advisory |
https://github.com/eset/vulnerability-disclosures | Third Party Advisory |
https://github.com/eset/vulnerability-disclosures/blob/master/CVE-2020-15479/CVE-2020-15479.md | Exploit Third Party Advisory |
https://www.passmark.com/forum/index.php | Vendor Advisory |
https://www.passmark.com/support/index.php | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:05
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/eset/vulnerability-disclosures - Third Party Advisory | |
References | () https://github.com/eset/vulnerability-disclosures/blob/master/CVE-2020-15479/CVE-2020-15479.md - Exploit, Third Party Advisory | |
References | () https://www.passmark.com/forum/index.php - Vendor Advisory | |
References | () https://www.passmark.com/support/index.php - Vendor Advisory |
Information
Published : 2020-08-07 21:15
Updated : 2024-11-21 05:05
NVD link : CVE-2020-15479
Mitre link : CVE-2020-15479
CVE.ORG link : CVE-2020-15479
JSON object : View
Products Affected
passmark
- osforensics
- burnintest
- performancetest
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')