Amzetta zPortal Windows zClient is affected by Buffer Overflow. IOCTL Handler 0x22001B in the Amzetta zPortal Windows zClient <= v3.2.8180.148 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.
References
Link | Resource |
---|---|
https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ | Exploit Technical Description Third Party Advisory |
https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ | Exploit Technical Description Third Party Advisory |
Configurations
History
21 Nov 2024, 06:28
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/ - Exploit, Technical Description, Third Party Advisory |
Information
Published : 2021-12-07 20:15
Updated : 2024-11-21 06:28
NVD link : CVE-2021-43000
Mitre link : CVE-2021-43000
CVE.ORG link : CVE-2021-43000
JSON object : View
Products Affected
amzetta
- zportal_windows_zclient
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')