WinPcap NPF.SYS bpf_filter_init Arbitrary Array Indexing Local Privilege Escalation

medium Nessus Plugin ID 28182

Synopsis

The remote Windows host contains an application that is prone to a local privilege escalation vulnerability.

Description

WinPcap, a packet capture and filtering engine, is installed on the remote Windows host.

The version of WinPcap on the remote host enables a local user to execute arbitrary code in kernel context because it fails to validate array indices passed to the 'bpf_filter_init()' function via specially crafted IOCTL requests.

Solution

Upgrade to WinPcap version 4.0.2 or later.

See Also

http://www.nessus.org/u?59d8c4d1

https://www.securityfocus.com/archive/1/483581/30/0/threaded

https://www.winpcap.org/misc/changelog.htm

Plugin Details

Severity: Medium

ID: 28182

File Name: winpcap_npf_bpf_filter_init.nasl

Version: 1.16

Type: local

Agent: windows

Family: Windows

Published: 11/13/2007

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.9

Temporal Score: 5.1

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: SMB/Registry/Enumerated

Exploit Ease: No known exploits are available

Reference Information

CVE: CVE-2007-5756

BID: 26409

CWE: 119