Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Sandboxie Arbitrary Kernel Read in SbieDrv.sys API (API_SET_SECURE_PARAM)
Vulnerability Description
Sandboxie is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. Starting in version 1.3.0 and prior to version 1.15.12, Api_SetSecureParam fails to sanitize incoming pointers, and implicitly trusts that the pointer the user has passed in is safe to read from. SetRegValue then reads an arbitrary address, which can be a kernel pointer, into a HKLM Security SBIE registry value. This can later be retrieved by API_GET_SECURE_PARAM. Version 1.15.12 fixes the issue.
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Vulnerability Type
跨界内存读
Vulnerability Title
Sandboxie 缓冲区错误漏洞
Vulnerability Description
Sandboxie是sandboxie-plus开源的一款基于沙盒的隔离软件。 Sandboxie 1.3.0至1.15.12之前版本存在缓冲区错误漏洞,该漏洞源于Api_SetSecureParam未清理传入指针,可能读取任意内核地址。
CVSS Information
N/A
Vulnerability Type
N/A