First published: Fri Feb 06 2015(Updated: )
K7Sentry.sys in K7 Computing Ultimate Security, Anti-Virus Plus, and Total Security before 14.2.0.253 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a crafted 0x95002570, 0x95002574, 0x95002580, 0x950025a8, 0x950025ac, or 0x950025c8 IOCTL call.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
K7 Computing Sentry | <=12.8.0.117 | |
K7 Computing Anti-Virus Plus | <=14.2.0.252 | |
K7 Computing Total Security | <=14.2.0.252 | |
K7 Ultimate Security | <=14.2.0.252 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9643 is rated as a high-severity vulnerability due to the potential for privilege escalation.
To mitigate CVE-2014-9643, update K7 Computing software to versions 14.2.0.253 or later.
CVE-2014-9643 affects users of K7 Computing Ultimate Security, Anti-Virus Plus, and Total Security software below version 14.2.0.253.
CVE-2014-9643 can be exploited by local users through crafted IOCTL calls to write to arbitrary memory locations.
Systems running vulnerable versions of K7 Computing security products prior to 14.2.0.253 are at risk from CVE-2014-9643.