7.8
CVSSv3

CVE-2017-14153

Published: 11/09/2017 Updated: 17/10/2018
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 725
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

This vulnerability allows local malicious users to escalate privileges on Jungo WinDriver 12.4.0 and previous versions. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the processing of IOCTL 0x953824b7 by the windrvr1240 kernel driver. The issue lies in the failure to properly validate user-supplied data which can result in a kernel pool overflow. An attacker can leverage this vulnerability to execute arbitrary code under the context of kernel.

Vulnerable Product Search on Vulmon Subscribe to Product

jungo windriver

Exploits

# -*- coding: utf-8 -*- """ Jungo DriverWizard WinDriver Kernel Pool Overflow Vulnerability Download: wwwjungocom/st/products/windriver/ File: WD1240EXE Sha1: 3527cc974ec885166f0d96f6aedc8e542bb66cba Driver: windrvr1240sys Sha1: 0f212075d86ef7e859c1941f8e5b9e7a6f2558ad CVE: CVE-2017-14153 Author: Steven Seeley (mr_m ...
Jungo DriverWizard WinDrive suffers from a kernel pool overflow vulnerability ...

Github Repositories

How to use the kex library Dependencies: None, it only uses default Python system libraries, and this won’t change in the future, I want to keep it package independent It works with Python 27x, and wasn’t tested with 3x Sources If I used a function I found somewhere, I tried to point this out in the comments Specifically the GDI bitmap abuse ones are taken fro