複数の Sophos SafeGuard 製品における認可・権限・アクセス制御に関する脆弱性
| Title |
複数の Sophos SafeGuard 製品における認可・権限・アクセス制御に関する脆弱性
|
| Summary |
Sophos SafeGuard Enterprise、SafeGuard Easy、および SafeGuard LAN Crypt には、認可・権限・アクセス制御に関する脆弱性が存在します。
|
| Possible impacts |
情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution |
ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date |
June 27, 2018, midnight |
| Registration Date |
Oct. 1, 2018, 4:29 p.m. |
| Last Update |
Oct. 1, 2018, 4:29 p.m. |
|
CVSS3.0 : 重要
|
| Score |
7.8
|
| Vector |
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
CVSS2.0 : 危険
|
| Score |
7.2
|
| Vector |
AV:L/AC:L/Au:N/C:C/I:C/A:C |
Affected System
| ソフォス |
|
SafeGuard Easy Device Encryption Client 7.00.3 未満
|
|
SafeGuard Enterprise Device Encryption 8.00.5 未満
|
|
SafeGuard LAN Crypt 3.95.2 未満
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
| No |
Changed Details |
Date of change |
| 1 |
[2018年10月01日] 掲載 |
Oct. 1, 2018, 4:29 p.m. |
NVD Vulnerability Information
CVE-2018-6857
| Summary |
Sophos SafeGuard Enterprise before 8.00.5, SafeGuard Easy before 7.00.3, and SafeGuard LAN Crypt before 3.95.2 are vulnerable to Local Privilege Escalation via IOCTL 0x802022E0. By crafting an input buffer we can control the execution path to the point where the constant 0x12 will be written to a user-controlled address. We can take advantage of this condition to modify the SEP_TOKEN_PRIVILEGES structure of the Token object belonging to the exploit process and grant SE_DEBUG_NAME privilege. This allows the exploit process to interact with higher privileged processes running as SYSTEM and execute code in their security context.
|
| Publication Date |
July 10, 2018, 3:29 a.m. |
| Registration Date |
March 1, 2021, 7:36 p.m. |
| Last Update |
Nov. 21, 2024, 1:11 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:sophos:safeguard_lan_crypt_client:3.95.1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:sophos:safeguard_lan_crypt_client:3.90.2:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:sophos:safeguard_enterprise_client:8.00:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:sophos:safeguard_enterprise_client:7.00:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:sophos:safeguard_enterprise_client:6.10:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:sophos:safeguard_enterprise_client:6.00:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:sophos:safeguard_enterprise_client:6.00.1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:sophos:safeguard_easy_device_encryption_client:6.00:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:sophos:safeguard_easy_device_encryption_client:6.10:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:sophos:safeguard_easy_device_encryption_client:7.00:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:sophos:safeguard_lan_crypt_client:3.95.1:ts:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:sophos:safeguard_lan_crypt_client:3.90.1:ts:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:sophos:safeguard_enterprise_client:5.60.3:vs-nfd:*:*:*:*:*:* |
|
|
|
|
Related information, measures and tools
Common Vulnerabilities List