Kaspersky Internet Security KLDISK... CVE-2016-4306 CNNVD-201609-099

2.1 AV AC AU C I A
发布: 2017-01-06
修订: 2017-08-13

### Summary Multiple information leaks exist in various IOCTL handlers of the Kaspersky Internet Security KLDISK driver. Specially crafted IOCTL requests can cause the driver to return out of bounds kernel memory, potentially leaking sensitive information such as privileged tokens or kernel memory addresses that may be useful in bypassing kernel mitigations. An unprivileged user can run a program from user mode to trigger this vulnerability. ``` Because of used transfer type : METHOD_BUFFERED for in/out buffer and wrongly set value of output buffer len to IoStatus.Information ``` it leads to leak of kernel memory to userland. ### Tested Versions Kaspersky Total Security 16.0.0.614 ### Product URLs http://www.kaspersky.com/ ### Details This vulnerability can be triggered by sending IOCTL requests to the KlDiskCtl device. Here we show the default access control on the device allow any user on the system to send IOCTL requests: ``` accesschk.exe -q -o \Device\KlDiskCtl...

0%
暂无可用Exp或PoC
当前有1条受影响产品信息