Dokan, versions between 1.0.0.5000 and 1.2.0.1000, are vulnerable to a stack-based buffer overflow in the dokan1.sys driver. An attacker can create a device handle to the system driver and send arbitrary input that will trigger the vulnerability. This vulnerability was introduced in the 1.0.0.5000 version update.
Solution:
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://kb.cert.org/vuls/id/741315/ | third party advisory us government resource |
https://www.exploit-db.com/exploits/46155/ | third party advisory vdb entry exploit |
https://cwe.mitre.org/data/definitions/121.html | third party advisory |
https://github.com/dokan-dev/dokany/releases/tag/v1.2.1.1000 | third party advisory patch |
http://www.securityfocus.com/bid/106274 | third party advisory vdb entry |