Learn about CVE-2017-6008, a vulnerability in Sophos SurfRight HitmanPro driver hitmanpro37.sys before 3.7.20 Build 286, allowing local users to escalate privileges via a malformed IOCTL call. Find mitigation steps and prevention measures here.
Sophos SurfRight HitmanPro driver hitmanpro37.sys before version 3.7.20 Build 286 is vulnerable to a kernel pool overflow, allowing local users to gain elevated privileges through a malformed IOCTL call.
Understanding CVE-2017-6008
This CVE describes a vulnerability in the HitmanPro driver that could be exploited by local users to escalate privileges.
What is CVE-2017-6008?
The driver hitmanpro37.sys in Sophos SurfRight HitmanPro versions before 3.7.20 Build 286 is susceptible to a kernel pool overflow, enabling local users to elevate their privileges via a malformed IOCTL call.
The Impact of CVE-2017-6008
This vulnerability could be exploited by local users to gain elevated privileges on the affected systems.
Technical Details of CVE-2017-6008
The technical aspects of the CVE-2017-6008 vulnerability are as follows:
Vulnerability Description
A kernel pool overflow in the driver hitmanpro37.sys in Sophos SurfRight HitmanPro before 3.7.20 Build 286 allows local users to escalate privileges through a malformed IOCTL call.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability can be exploited by local users through a malformed IOCTL call to gain elevated privileges.
Mitigation and Prevention
Steps to mitigate and prevent exploitation of CVE-2017-6008:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates