cvelist/2023/1xxx/CVE-2023-1677.json
2023-10-21 14:00:40 +00:00

110 lines
4.2 KiB
JSON

{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-1677",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability was found in DriverGenius 9.70.0.346. It has been rated as problematic. Affected by this issue is the function 0x9c40a0c8/0x9c40a0dc/0x9c40a0e0/0x9c40a0d8/0x9c4060d4/0x9c402004/0x9c402088/0x9c40208c/0x9c4060d0/0x9c4060cc/0x9c4060c4/0x9c402084 in the library mydrivers64.sys of the component IOCTL Handler. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. VDB-224234 is the identifier assigned to this vulnerability."
},
{
"lang": "deu",
"value": "Eine problematische Schwachstelle wurde in DriverGenius 9.70.0.346 ausgemacht. Hierbei geht es um die Funktion 0x9c40a0c8/0x9c40a0dc/0x9c40a0e0/0x9c40a0d8/0x9c4060d4/0x9c402004/0x9c402088/0x9c40208c/0x9c4060d0/0x9c4060cc/0x9c4060c4/0x9c402084 in der Bibliothek mydrivers64.sys der Komponente IOCTL Handler. Durch Beeinflussen mit unbekannten Daten kann eine denial of service-Schwachstelle ausgenutzt werden. Der Angriff muss lokal passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-404 Denial of Service",
"cweId": "CWE-404"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "DriverGenius",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "9.70.0.346"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.224234",
"refsource": "MISC",
"name": "https://vuldb.com/?id.224234"
},
{
"url": "https://vuldb.com/?ctiid.224234",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.224234"
},
{
"url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1677",
"refsource": "MISC",
"name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1677"
},
{
"url": "https://drive.google.com/file/d/1C7afiLbOOLuYZVeeslPW3AdNeOIwUea9/view",
"refsource": "MISC",
"name": "https://drive.google.com/file/d/1C7afiLbOOLuYZVeeslPW3AdNeOIwUea9/view"
}
]
},
"credits": [
{
"lang": "en",
"value": "Zeze7w (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 5.5,
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 5.5,
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 4.6,
"vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:C"
}
]
}
}