Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:iobit:advanced_systemcare:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE61E4CC-08EB-46DD-9EA3-6802B5F2A1B8", "versionEndIncluding": "1.2.0.5", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "IObit Advanced SystemCare, which includes Monitor_win10_x64.sys or Monitor_win7_x64.sys, 1.2.0.5 (and possibly earlier versions) allows a user to send an IOCTL (0x9C402084) with a buffer containing user defined content. The driver's subroutine will execute a rdmsr instruction with the user's buffer for input, and provide output from the instruction."}, {"lang": "es", "value": "IObit Advanced SystemCare, que incluye Monitor_win10_x64.sys o Monitor_win7_x64.sys, en su versi\u00f3n 1.2.0.5 (y posiblemente tambi\u00e9n en versiones anteriores) permite que un usuario env\u00ede una llamada IOCTL (0x9C402084) con un b\u00fafer que contiene contenidos definidos por el usuario. La subrutina del controlador ejecutar\u00e1 una instrucci\u00f3n rdmsr con el b\u00fafer del usuario como entrada y proporcionar\u00e1 una salida a partir de la instrucci\u00f3n."}], "id": "CVE-2018-16713", "lastModified": "2024-11-21T03:53:12.623", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 6.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0"}, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2018-09-26T22:29:01.310", "references": [{"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://downwithup.github.io/CVEPosts.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://downwithup.github.io/CVEPosts.html"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-119"}], "source": "nvd@nist.gov", "type": "Primary"}]}