Dokan, versions between 1.0.0.5000 and 1.2.0.1000, are vulnerable to a stack-based buffer overflow in the dokan1.sys driver. An attacker can create a device handle to the system driver and send arbitrary input that will trigger the vulnerability. This vulnerability was introduced in the 1.0.0.5000 version update.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-17180 | Dokan, versions between 1.0.0.5000 and 1.2.0.1000, are vulnerable to a stack-based buffer overflow in the dokan1.sys driver. An attacker can create a device handle to the system driver and send arbitrary input that will trigger the vulnerability. This vulnerability was introduced in the 1.0.0.5000 version update. |
Fixes
Solution
Dokan developers have released a new version, 1.2.1, that fixes this vulnerability by validating the user input.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-08-05T05:33:44.211Z
Reserved: 2018-01-12T00:00:00
Link: CVE-2018-5410
No data.
Status : Modified
Published: 2019-01-07T13:29:00.280
Modified: 2024-11-21T04:08:46.063
Link: CVE-2018-5410
No data.
OpenCVE Enrichment
No data.
EUVD