SB2018122408 - Multiple vulnerabilities in Wibukey
Published: December 24, 2018 Updated: June 28, 2023
Security Bulletin ID
SB2018122408
Severity
High
Patch available
YES
Number of vulnerabilities
3
Exploitation vector
Remote access
Highest impact
Code execution
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Heap-based buffer overflow (CVE-ID: CVE-2018-3991)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to heap-based buffer overflow in the WkbProgramLow function of WibuKey Network server management when handling malicious input. A remote attacker can supply a specially crafted TCP package, trigger memory corruption and execute kernel level code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
2) Buffer overflow (CVE-ID: CVE-2018-3990)
The vulnerability allows a local attacker to gain elevated privileges on the target system.The weakness exists due to buffer overflow in the 0x8200E804 IOCTL handler functionality of WibuKey.sys when handling malicious input. A local attacker can use a specially crafted IRP request, trigger kernel memory corruption and gain elevated privileges.
3) Information disclosure (CVE-ID: CVE-2018-3989)
The vulnerability allows a local attacker to obtain potentially sensitive information on the target system.The weakness exists due to information exposure in the 0x8200E804 IOCTL handler functionality when handling malicious input. A local attacker can use a specially crafted IRP request, cause the driver to return uninitialized memory and disclose kernel memory.
Remediation
Install update from vendor's website.