First published: Fri Dec 12 2014(Updated: )
Stack-based buffer overflow in the K7Sentry.sys kernel mode driver (aka K7AV Sentry Device Driver) before 12.8.0.119, as used in multiple K7 Computing products, allows local users to execute arbitrary code with kernel privileges via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
K7 Computing Anti-Virus | <=12.8.0.118 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8956 has a high severity rating due to its potential for local users to execute arbitrary code with kernel privileges.
To fix CVE-2014-8956, users should update the K7AV Sentry Device Driver to version 12.8.0.119 or later.
CVE-2014-8956 affects local users of K7 Computing products utilizing versions of the K7AV Sentry Device Driver below 12.8.0.119.
CVE-2014-8956 is categorized as a stack-based buffer overflow vulnerability.
CVE-2014-8956 was disclosed in December 2014.