Last Modified: July 11, 2017
Integrity Protection Driver (IPD) 1.2 and earlier blocks access to \Device\PhysicalMemory by its name, which could allow local privileged processes to overwrite kernel memory by accessing the device through a symlink.
Access Vector: Local
Access Complexity: Low
Authentication: None
Confidentiality Impact: None
Integrity Impact: Partial
Availability Impact: None
Base Score: 2.1
Exploitability Score: 3.9
Impact Score: 2.9
CVSS V2: AV:L/AC:L/Au:N/C:N/I:P/A:N
NVD-CWE-Other
Condition | Configuration | |
---|---|---|
OR | ||
OR | ||
cpe:2.3:a:pedestal_software:integrity_protection_driver:1.2:*:*:*:*:*:*:* Part: a Vendor: pedestal_software | Alle Schwachstellen für pedestal_software |
<?xml version="1.0" ?> <set operator="and"> <set operator="or"> <prop key="application" value="cpe:2.3:a:pedestal_software:integrity_protection_driver:1.2:*:*:*:*:*:*:*"/> </set> <prop key="program_influence" value="input"/> <prop key="range" value="local"/> </set>
<?xml version="1.0" ?> <set operator="and"> <prop key="target" value="host"/> <set operator="or"> <prop key="program_influence" value="input"/> <prop key="program_influence" value="output"/> <prop key="program_influence" value="existence"/> </set> <prop key="data" value="any"/> <set operator="or"> <prop key="data_influence" value="write"/> <prop key="data_influence" value="delete"/> </set> <set operator="or"> <prop key="range" value="local"/> <prop key="range" value="local"/> </set> </set>