CVE-2014-8956
Summary
| CVE | CVE-2014-8956 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2014-12-12 15:59:00 UTC |
| Updated | 2014-12-16 03:32:00 UTC |
| Description | Stack-based buffer overflow in the K7Sentry.sys kernel mode driver (aka K7AV Sentry Device Driver) before 12.8.0.119, as used in multiple K7 Computing products, allows local users to execute arbitrary code with kernel privileges via unspecified vectors. |
Risk And Classification
Problem Types: CWE-119
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | K7computing | K7av Sentry Device Driver | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Full Disclosure: CVE-2014-8956 - Privilege Escalation In K7 Computing Multiple Products [K7Sentry.sys] | FULLDISC | seclists.org | Exploit |
| CVE-2014-8956 | K7 Computing Privilege Escalation | MISC | www.portcullis-security.com | Exploit |
| K7 Computing Multiple Products K7Sentry.sys Out-Of-Bounds Write ≈ Packet Storm | MISC | packetstormsecurity.com | Exploit |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.