An issue was discovered in PassMark BurnInTest through 9.1, OSForensics through 7.1, and PerformanceTest through 10. The driver's IOCTL request handler attempts to copy the input buffer onto the stack without checking its size and can cause a buffer overflow. This could lead to arbitrary Ring-0 code execution and escalation of privileges. This affects DirectIo32.sys and DirectIo64.sys.
References
Link | Resource |
---|---|
https://github.com/eset/vulnerability-disclosures | Third Party Advisory |
https://www.passmark.com/support/index.php | Vendor Advisory |
https://www.passmark.com/forum/index.php | Vendor Advisory |
https://github.com/eset/vulnerability-disclosures/blob/master/CVE-2020-15479/CVE-2020-15479.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-08-07 14:15
Updated : 2020-08-12 09:07
NVD link : CVE-2020-15479
Mitre link : CVE-2020-15479
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
passmark
- burnintest
- performancetest
- osforensics