Impact
The flaw is a stack buffer overflow in Sandboxie-Plus 1.17.2 and earlier, where the NamedPipeServer::OpenHandler copies an unbounded server name into a fixed 160‑wide‑character buffer using wcscat without verifying null termination. An attacker running a sandboxed process can send a crafted request that overflows the buffer, causing the SbieSvc service to crash or, at a minimum, granting a sandbox escape that could be leveraged for code execution with SYSTEM privileges.
Affected Systems
Sandboxie-Plus 1.17.2 and all earlier releases are affected. The vulnerability is only present in the sandboxed service component of Sandboxie-Plus and does not impact the base Windows operating system.
Risk and Exploitability
The CVSS score of 8.8 indicates high severity. EPSS is not available, and the vulnerability is not listed in the CISA KEV catalog, though the potential for SYSTEM code execution makes it a serious threat. Exploitation requires the attacker to be able to run a process within the sandbox; once inside, the attacker can send the malformed NamedPipe request to trigger the overflow. The restricted attack surface reduces the likelihood of widespread exploitation, but the impact of a successful attack is catastrophic.
OpenCVE Enrichment