Vulnerability Details : CVE-2011-0513
DCR.sys driver in SecurStar DriveCrypt 5.4, 5.3, and earlier allows local users to execute arbitrary code via a crafted argument to the 0x00073800 IOCTL.
Vulnerability category: Input validationExecute code
Exploit prediction scoring system (EPSS) score for CVE-2011-0513
Probability of exploitation activity in the next 30 days: 0.05%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 12 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2011-0513
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST |
CWE ids for CVE-2011-0513
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-0513
-
http://www.exploit-db.com/exploits/15972
DriveCrypt 5.3 - Local Kernel Ring0 SYSTEM - Windows local ExploitExploit
-
http://www.vupen.com/english/advisories/2011/0084
Webmail | OVH- OVHVendor Advisory
-
http://www.securityfocus.com/bid/45750
DriveCrypt 'DCR.sys' Arbitrary File Read Write Local Privilege Escalation VulnerabilityExploit
Products affected by CVE-2011-0513
- cpe:2.3:a:securstar:drivecrypt:*:*:*:*:*:*:*:*
- cpe:2.3:a:securstar:drivecrypt:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:securstar:drivecrypt:4.6:*:*:*:*:*:*:*
- cpe:2.3:a:securstar:drivecrypt:5.1:*:*:*:*:*:*:*
- cpe:2.3:a:securstar:drivecrypt:4.61:*:*:*:*:*:*:*
- cpe:2.3:a:securstar:drivecrypt:5.3:*:*:*:*:*:*:*