WinPcap NPF.SYS bpf_filter_init Arbitrary Array Indexing Local Privilege Escalation

Medium Nessus Plugin ID 28182


The remote Windows host contains an application that is prone to a local privilege escalation vulnerability.


WinPcap, a packet capture and filtering engine, is installed on the remote Windows host.

The version of WinPcap on the remote host enables a local user to execute arbitrary code in kernel context because it fails to validate array indices passed to the 'bpf_filter_init()' function via specially crafted IOCTL requests.


Upgrade to WinPcap version 4.0.2 or later.

See Also

Plugin Details

Severity: Medium

ID: 28182

File Name: winpcap_npf_bpf_filter_init.nasl

Version: $Revision: 1.14 $

Type: local

Agent: windows

Family: Windows

Published: 2007/11/13

Modified: 2015/01/12

Dependencies: 13855, 10456

Risk Information

Risk Factor: Medium


Base Score: 6.9

Temporal Score: 5.1

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

Required KB Items: SMB/Registry/Enumerated

Exploit Available: false

Exploit Ease: No known exploits are available

Reference Information

CVE: CVE-2007-5756

BID: 26409

OSVDB: 42166

CWE: 119