First published: Wed Apr 26 2017(Updated: )
The Dolby DAX2 and DAX3 API services are vulnerable to a privilege escalation vulnerability that allows a normal user to get arbitrary system privileges, because these services have .NET code for DCOM. This affects Dolby Audio X2 (DAX2) 1.0, 1.0.1, 1.1, 1.1.1, 1.2, 1.3, 1.3.1, 1.3.2, 1.4, 1.4.1, 1.4.2, 1.4.3, and 1.4.4 and Dolby Audio X3 (DAX3) 1.0 and 1.1. An example affected driver is Realtek Audio Driver 6.0.1.7898 on a Lenovo P50.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dolby Audio | =1.0 | |
Dolby Audio | =1.0.1 | |
Dolby Audio | =1.1 | |
Dolby Audio | =1.1.1 | |
Dolby Audio | =1.2 | |
Dolby Audio | =1.3 | |
Dolby Audio | =1.3.1 | |
Dolby Audio | =1.3.2 | |
Dolby Audio | =1.4 | |
Dolby Audio | =1.4.1 | |
Dolby Audio | =1.4.2 | |
Dolby Audio | =1.4.3 | |
Dolby Audio | =1.4.4 | |
Dolby Audio | =1.0 | |
Dolby Audio | =1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7293 has a severity rating that indicates a critical risk due to its potential for privilege escalation.
To fix CVE-2017-7293, you should update to the latest version of Dolby Audio X2 or apply any available patches that address this vulnerability.
CVE-2017-7293 affects users of Dolby Audio X2 versions 1.0 through 1.4.4 and Dolby Audio X3 versions 1.0 and 1.1.
CVE-2017-7293 is classified as a privilege escalation vulnerability that allows normal users to gain arbitrary system privileges.
CVE-2017-7293 typically requires local access to the vulnerable system to exploit the privilege escalation vulnerability.