{"api_version":"1","generated_at":"2026-04-23T05:57:16+00:00","cve":"CVE-2017-6007","urls":{"html":"https://cve.report/CVE-2017-6007","api":"https://cve.report/api/cve/CVE-2017-6007.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2017-6007","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2017-6007"},"summary":{"title":"CVE-2017-6007","description":"A kernel pool overflow in the driver hitmanpro37.sys in Sophos SurfRight HitmanPro before 3.7.20 Build 286 (included in the HitmanPro.Alert solution and Sophos Clean) allows local users to crash the OS via a malformed IOCTL call.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2017-09-13 08:29:00","updated_at":"2017-09-21 15:28:00"},"problem_types":["CWE-119"],"metrics":[],"references":[{"url":"https://www.nuitduhack.com/fr/planning/talk_10","name":"https://www.nuitduhack.com/fr/planning/talk_10","refsource":"MISC","tags":["Third Party Advisory"],"title":"(FR) Windows 10 Pool Party | NDH XV","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-7/","name":"https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-7/","refsource":"MISC","tags":["Exploit","Technical Description","Third Party Advisory"],"title":"Kernel Pool Overflow Exploitation In Real World – Windows 7 | TRACKWATCH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2017-6007","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-6007","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2017","cve_id":"6007","vulnerable":"1","versionEndIncluding":"3.7.20","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sophos","cpe5":"hitmanpro","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2017-6007","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A kernel pool overflow in the driver hitmanpro37.sys in Sophos SurfRight HitmanPro before 3.7.20 Build 286 (included in the HitmanPro.Alert solution and Sophos Clean) allows local users to crash the OS via a malformed IOCTL call."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-7/","refsource":"MISC","url":"https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-7/"},{"name":"https://www.nuitduhack.com/fr/planning/talk_10","refsource":"MISC","url":"https://www.nuitduhack.com/fr/planning/talk_10"}]}},"nvd":{"publishedDate":"2017-09-13 08:29:00","lastModifiedDate":"2017-09-21 15:28:00","problem_types":["CWE-119"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":5.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.8,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:C","accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE","baseScore":4.9},"severity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.9,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:sophos:hitmanpro:*:*:*:*:*:*:*:*","versionEndIncluding":"3.7.20","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2017","CveId":"6007","Ordinal":"102634","Title":"CVE-2017-6007","CVE":"CVE-2017-6007","Year":"2017"},"notes":[{"CveYear":"2017","CveId":"6007","Ordinal":"1","NoteData":"A kernel pool overflow in the driver hitmanpro37.sys in Sophos SurfRight HitmanPro before 3.7.20 Build 286 (included in the HitmanPro.Alert solution and Sophos Clean) allows local users to crash the OS via a malformed IOCTL call.","Type":"Description","Title":null},{"CveYear":"2017","CveId":"6007","Ordinal":"2","NoteData":"2017-09-13","Type":"Other","Title":"Published"},{"CveYear":"2017","CveId":"6007","Ordinal":"3","NoteData":"2017-09-13","Type":"Other","Title":"Modified"}]}}}