The MsIo64.sys component in Asus Aura Sync through v1.07.79 does not properly validate input to IOCTL 0x80102040, 0x80102044, 0x80102050, and 0x80102054, allowing attackers to trigger a memory corruption and cause a Denial of Service (DoS) or escalate privileges via crafted IOCTL requests.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://heegong.github.io/posts/ASUS-AuraSync-Kernel-Stack-Based-Buffer-Overflow-Local-Privilege-Escalation/ | exploit third party advisory technical description |
https://www.asus.com/campaign/aura/us/download.php | product vendor advisory |
https://www.asus.com/content/ASUS-Product-Security-Advisory/ | vendor advisory |
http://packetstormsecurity.com/files/174447/MsIo64-LOLDriver-Memory-Corruption.html |