---------------------------------------------------------------------- Proof-of-Concept (PoC) and Extended Analysis available for customers. Get a free trial, contact sales@secunia.com ---------------------------------------------------------------------- TITLE: 360 Safe SafeBoxKrnl.sys Two Vulnerabilities SECUNIA ADVISORY ID: SA39634 VERIFY ADVISORY: http://secunia.com/advisories/39634/ DESCRIPTION: Two vulnerabilities have been reported in 360 Safe, which can be exploited by malicious, local users to perform certain actions with escalated privileges, cause a DoS (Denial of Service), or potentially gain escalated privileges. 1) The SafeBoxKrnl.sys driver improperly passes userspace pointers to the "IoFreeMdl()" function when processing IOCTLs. This can be exploited to corrupt kernel memory and cause a system crash or potentially execute arbitrary code with escalated privileges. 2) An error in the SafeBoxKrnl.sys driver can be exploited to terminate an arbitrary process via a specially crafted IOCTL. The vulnerabilities are reported in versions prior to 3.0.0.1010. SOLUTION: Update to version 3.0.0.1010 or later. PROVIDED AND/OR DISCOVERED BY: NT Internals ORIGINAL ADVISORY: http://www.ntinternals.org/ntiadv1003/ntiadv1003.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------