cve/2023/CVE-2023-0977.md

18 lines
840 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-0977](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0977)
![](https://img.shields.io/static/v1?label=Product&message=Trellix%20Agent&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=5.7.8%3C%3D%205.7.8%20%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20('Classic%20Buffer%20Overflow')&color=brighgreen)
### Description
A heap-based overflow vulnerability in Trellix Agent (Windows and Linux) version 5.7.8 and earlier, allows a remote user to alter the page heap in the macmnsvc process memory block resulting in the service becoming unavailable.
### POC
#### Reference
- https://kcm.trellix.com/corporate/index?page=content&id=SB10396
#### Github
No PoCs found on GitHub currently.