Velocidex WinPmem versions 4.1 and below suffer from an Improper Input Validation vulnerability whereby an attacker with admin access can trigger a BSOD with a parallel thread changing the memory’s access right under the control of the user-mode application. This is due to verification only being performed at the beginning of the routine allowing the userspace to change page permissions half way through the routine. A valid workaround is a rule to detect unauthorized loading of winpmem outside incident response operations.
References
Configurations
No configuration.
History
16 Dec 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) Velocidex WinPmem versions 4.1 and below suffer from an Improper Input Validation vulnerability whereby an attacker with admin access can trigger a BSOD with a parallel thread changing the memory’s access right under the control of the user-mode application. This is due to verification only being performed at the beginning of the routine allowing the userspace to change page permissions half way through the routine. A valid workaround is a rule to detect unauthorized loading of winpmem outside incident response operations. |
16 Dec 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-16 15:15
Updated : 2024-12-16 16:15
NVD link : CVE-2024-10972
Mitre link : CVE-2024-10972
CVE.ORG link : CVE-2024-10972
JSON object : View
Products Affected
No product.
CWE
CWE-20
Improper Input Validation