2024-12-22 03:03:49 +00:00

60 lines
2.5 KiB
JSON

{
"id": "CVE-2024-10972",
"sourceIdentifier": "cve@rapid7.com",
"published": "2024-12-16T15:15:06.067",
"lastModified": "2024-12-16T16:15:05.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Velocidex WinPmem versions 4.1 and below suffer from an Improper Input Validation vulnerability whereby an attacker with admin access can trigger a BSOD\u00a0with a parallel thread changing the memory\u2019s access right under the control of the user-mode application. This is due to verification only being performed at the beginning of the routine allowing the\u00a0userspace to change page permissions half way through the routine.\u00a0 A valid workaround is a rule to detect unauthorized loading of winpmem outside incident response operations."
},
{
"lang": "es",
"value": "Las versiones 4.1 y anteriores de Velocidex WinPmem sufren una vulnerabilidad de validaci\u00f3n de entrada incorrecta mediante la cual un atacante con acceso de administrador puede generar un BSOD con un subproceso paralelo que cambia el derecho de acceso a la memoria bajo el control de la aplicaci\u00f3n en modo de usuario. Esto se debe a que la verificaci\u00f3n solo se realiza al comienzo de la rutina, lo que permite que el espacio de usuario cambie los permisos de la p\u00e1gina a mitad de la rutina. Un workaround v\u00e1lida es una regla para detectar la carga no autorizada de winpmem fuera de las operaciones de respuesta a incidentes."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@rapid7.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.5,
"impactScore": 5.3
}
]
},
"weaknesses": [
{
"source": "cve@rapid7.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://github.com/Velocidex/WinPmem/releases/tag/v4.1.dev1",
"source": "cve@rapid7.com"
}
]
}