A Use after Free vulnerability exists in IOBit Advanced SystemCare 15 pro via requests sent in sequential order using the IOCTL driver codes, which could let a malicious user execute arbitrary code or a Denial of Service (system crash). IOCTL list: iobit_ioctl = [0x8001e01c, 0x8001e020, 0x8001e024, 0x8001e040,0x8001e044, 0x8001e048, 0x8001e04c, 0x8001e000, 0x8001e004, 0x8001e008, 0x8001e00c, 0x8001e010, 0x8001e014, 0x8001e018]
References
Link | Resource |
---|---|
https://github.com/Quadron-Research-Lab/Kernel_Driver_bugs/tree/main/iobit_advenced_system_care | Exploit Third Party Advisory |
https://github.com/Quadron-Research-Lab/Kernel_Driver_bugs/tree/main/iobit_advenced_system_care | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:31
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Quadron-Research-Lab/Kernel_Driver_bugs/tree/main/iobit_advenced_system_careĀ - Exploit, Third Party Advisory |
Information
Published : 2022-02-18 18:15
Updated : 2024-11-21 06:31
NVD link : CVE-2021-44968
Mitre link : CVE-2021-44968
CVE.ORG link : CVE-2021-44968
JSON object : View
Products Affected
iobit
- advanced_systemcare
CWE
CWE-416
Use After Free