First published: Fri Dec 12 2014(Updated: )
Heap-based buffer overflow in the K7FWFilt.sys kernel mode driver (aka K7Firewall Packet Driver) before 14.0.1.16, as used in multiple K7 Computing products, allows local users to execute arbitrary code with kernel privileges via a crafted parameter in a DeviceIoControl API call.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
K7 Computing K7 Firewall Packet Driver | <=14.0.1.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-7136 has a high severity rating due to the potential for local users to execute arbitrary code with kernel privileges.
To fix CVE-2014-7136, update the K7Firewall Packet Driver to version 14.0.1.16 or later.
CVE-2014-7136 affects multiple K7 Computing products utilizing the K7Firewall Packet Driver version 14.0.1.15 and earlier.
CVE-2014-7136 cannot be exploited remotely as it requires local user access to the affected system.
CVE-2014-7136 is a heap-based buffer overflow vulnerability found in a kernel mode driver.