Vulnerability Details : CVE-2017-10950
This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Bitdefender Total Security 21.0.24.62. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within processing of the 0x8000E038 IOCTL in the bdfwfpf driver. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker could leverage this vulnerability to execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-4776.
Vulnerability category: Execute code
Products affected by CVE-2017-10950
- cpe:2.3:a:bitdefender:total_security:21.0.24.62:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-10950
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 25 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-10950
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.9
|
MEDIUM | AV:L/AC:M/Au:N/C:C/I:C/A:C |
3.4
|
10.0
|
NIST | |
7.0
|
HIGH | CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.0
|
5.9
|
NIST |
CWE ids for CVE-2017-10950
-
The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations.Assigned by:
- nvd@nist.gov (Primary)
- zdi-disclosures@trendmicro.com (Secondary)
References for CVE-2017-10950
-
http://www.securityfocus.com/bid/100418
Bitdefender Total Security CVE-2017-10950 Local Privilege Escalation VulnerabilityThird Party Advisory;VDB Entry
-
https://zerodayinitiative.com/advisories/ZDI-17-693
ZDI-17-693 | Zero Day InitiativeThird Party Advisory;VDB Entry
Jump to