複数の Sophos SafeGuard 製品における認可・権限・アクセス制御に関する脆弱性
| Title |
複数の Sophos SafeGuard 製品における認可・権限・アクセス制御に関する脆弱性
|
| Summary |
Sophos SafeGuard Enterprise、SafeGuard Easy、および SafeGuard LAN Crypt には、認可・権限・アクセス制御に関する脆弱性が存在します。
|
| Possible impacts |
情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution |
ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date |
June 27, 2018, midnight |
| Registration Date |
Oct. 1, 2018, 4:29 p.m. |
| Last Update |
Oct. 1, 2018, 4:29 p.m. |
|
CVSS3.0 : 重要
|
| Score |
7.8
|
| Vector |
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
CVSS2.0 : 危険
|
| Score |
7.2
|
| Vector |
AV:L/AC:L/Au:N/C:C/I:C/A:C |
Affected System
| ソフォス |
|
SafeGuard Easy Device Encryption Client 7.00.3 未満
|
|
SafeGuard Enterprise Device Encryption 8.00.5 未満
|
|
SafeGuard LAN Crypt 3.95.2 未満
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
| No |
Changed Details |
Date of change |
| 1 |
[2018年10月01日] 掲載 |
Oct. 1, 2018, 4:29 p.m. |
NVD Vulnerability Information
CVE-2018-6853
| Summary |
Sophos SafeGuard Enterprise before 8.00.5, SafeGuard Easy before 7.00.3, and SafeGuard LAN Crypt before 3.95.2 are vulnerable to Local Privilege Escalation via IOCTL 0x80206024. By crafting an input buffer we can control the execution path to the point where a global variable will be written to a user controlled address. We can take advantage of this condition to zero-out the pointer to the security descriptor in the object header of a privileged process or modify the security descriptor itself and run code in the context of a process running as SYSTEM.
|
| Publication Date |
July 10, 2018, 3:29 a.m. |
| Registration Date |
March 1, 2021, 7:36 p.m. |
| Last Update |
Nov. 21, 2024, 1:11 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:sophos:safeguard_lan_crypt_client:3.95.1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:sophos:safeguard_lan_crypt_client:3.90.2:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:sophos:safeguard_enterprise_client:8.00:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:sophos:safeguard_enterprise_client:7.00:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:sophos:safeguard_enterprise_client:6.10:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:sophos:safeguard_enterprise_client:6.00:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:sophos:safeguard_enterprise_client:6.00.1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:sophos:safeguard_easy_device_encryption_client:6.00:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:sophos:safeguard_easy_device_encryption_client:6.10:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:sophos:safeguard_easy_device_encryption_client:7.00:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:sophos:safeguard_lan_crypt_client:3.95.1:ts:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:sophos:safeguard_lan_crypt_client:3.90.1:ts:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:sophos:safeguard_enterprise_client:5.60.3:vs-nfd:*:*:*:*:*:* |
|
|
|
|
Related information, measures and tools
Common Vulnerabilities List