Skip to content

fix: add buffer-length check in util.c#12

Open
orbisai0security wants to merge 1 commit into
PKRoma:masterfrom
orbisai0security:fix-v-008-ksysteminformer-util-input-validation
Open

fix: add buffer-length check in util.c#12
orbisai0security wants to merge 1 commit into
PKRoma:masterfrom
orbisai0security:fix-v-008-ksysteminformer-util-input-validation

Conversation

@orbisai0security
Copy link
Copy Markdown
Contributor

Summary

Fix critical severity security issue in KSystemInformer/util.c.

Vulnerability

Field Value
ID V-008
Severity CRITICAL
Scanner multi_agent_ai
Rule V-008
File KSystemInformer/util.c:44
CWE CWE-120

Description: The KSystemInformer kernel-mode driver exposes IOCTL interfaces that may not rigorously validate input buffer sizes and content before performing kernel operations. If IOCTL dispatch routines dereference user-supplied buffer pointers without ProbeForRead/ProbeForWrite guards or size validation, a local attacker can send a crafted IOCTL to trigger a kernel buffer overflow, NULL pointer dereference, or type confusion, escalating privileges to SYSTEM or causing a Blue Screen of Death (BSOD).

Changes

  • KSystemInformer/util.c

Verification

  • Build passes
  • Scanner re-scan confirms fix
  • LLM code review passed

Automated security fix generated by OrbisAI Security
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant