SSD Advisory – K7 Total Security Device Driver Arbitrary Memory Read

Credit to Author: SSD / Maor Schwartz| Date: Mon, 23 Oct 2017 10:31:38 +0000

Want to get paid for a vulnerability similar to this one?
Contact us at: sxsxdx@xbxexyxoxnxdxsxexcxuxrxixtxy.xcom
See our full scope at: https://blogs.securiteam.com/index.php/product_scope

Vulnerability Summary
The following advisory describes an Crash found in K7 Total Security.

Credit
An independent security researcher, has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure program

Vendor response
K7 has released patches to address this vulnerability – K7TotalSecurity version 15.1.0.305

Vulnerability details
User controlled input to K7Sentry device is not sufficiently sanitized, the user controlled input can be used to compare an arbitrary memory address with a fixed value which in turn can be used to read the content of arbitrary memory.

Crash report
By sending invalid kernel pointer we can crash the K7 Total Security process as shown here:

Proof of Concept
The PoC has been tested on Windows 7 x86

Print Friendly, PDF & Email

https://blogs.securiteam.com/index.php/feed