ID

VAR-201804-0459


CVE

CVE-2016-9038


TITLE

Invincea-X Race condition vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2016-009033

DESCRIPTION

An exploitable double fetch vulnerability exists in the SboxDrv.sys driver functionality of Invincea-X 6.1.3-24058. A specially crafted input buffer and race condition can result in kernel memory corruption, which could result in privilege escalation. An attacker needs to execute a special application locally to trigger this vulnerability. Invincea-X Contains a race condition vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Dell is a company based in Round Rock, Texas, USA. A number of Dell product privilege escalation vulnerabilities. Allows an attacker to exploit the vulnerability to escalate privileges. 2. Multiple security bypass vulnerabilities An attacker may leverage these issues to execute arbitrary code in the context of the vulnerable application to elevate privilege and bypass the authentication mechanism and gain unauthorized access

Trust: 2.43

sources: NVD: CVE-2016-9038 // JVNDB: JVNDB-2016-009033 // CNVD: CNVD-2017-21752 // BID: 99360

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2017-21752

AFFECTED PRODUCTS

vendor:sophosmodel:invincea-xscope:eqversion:6.1.3-24058

Trust: 1.6

vendor:dellmodel:precision towerscope:eqversion:5810

Trust: 0.9

vendor:dellmodel:invincea-xscope:eqversion:6.1.3-24058

Trust: 0.9

vendor:dellmodel:invincea dell protected workspacescope:eqversion:5.1.1-22303

Trust: 0.9

vendor:sophosmodel:invincea xscope:eqversion:6.1.3-24058

Trust: 0.8

sources: CNVD: CNVD-2017-21752 // BID: 99360 // JVNDB: JVNDB-2016-009033 // CNNVD: CNNVD-201707-079 // NVD: CVE-2016-9038

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-9038
value: HIGH

Trust: 1.0

talos-cna@cisco.com: CVE-2016-9038
value: HIGH

Trust: 1.0

NVD: CVE-2016-9038
value: HIGH

Trust: 0.8

CNVD: CNVD-2017-21752
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201707-079
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2016-9038
severity: MEDIUM
baseScore: 4.4
vectorString: AV:L/AC:M/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.4
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-21752
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

talos-cna@cisco.com: CVE-2016-9038
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.1
impactScore: 6.0
version: 3.0

Trust: 1.8

nvd@nist.gov: CVE-2016-9038
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.1
impactScore: 6.0
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2017-21752 // JVNDB: JVNDB-2016-009033 // CNNVD: CNNVD-201707-079 // NVD: CVE-2016-9038 // NVD: CVE-2016-9038

PROBLEMTYPE DATA

problemtype:CWE-362

Trust: 1.8

sources: JVNDB: JVNDB-2016-009033 // NVD: CVE-2016-9038

THREAT TYPE

local

Trust: 0.9

sources: BID: 99360 // CNNVD: CNNVD-201707-079

TYPE

competition condition problem

Trust: 0.6

sources: CNNVD: CNNVD-201707-079

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-009033

PATCH

title:Top Pageurl:https://www.sophos.com/en-us/products/intercept-x.aspx

Trust: 0.8

title:Patches for multiple Dell product privilege escalation vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/100434

Trust: 0.6

title:Dell Invincea-X Fixes for permission permissions and access control vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=71416

Trust: 0.6

sources: CNVD: CNVD-2017-21752 // JVNDB: JVNDB-2016-009033 // CNNVD: CNNVD-201707-079

EXTERNAL IDS

db:NVDid:CVE-2016-9038

Trust: 3.3

db:TALOSid:TALOS-2016-0256

Trust: 2.7

db:BIDid:99360

Trust: 2.5

db:JVNDBid:JVNDB-2016-009033

Trust: 0.8

db:CNVDid:CNVD-2017-21752

Trust: 0.6

db:CNNVDid:CNNVD-201707-079

Trust: 0.6

db:TALOSid:TALOS-2016-0246

Trust: 0.3

db:TALOSid:TALOS-2016-0247

Trust: 0.3

sources: CNVD: CNVD-2017-21752 // BID: 99360 // JVNDB: JVNDB-2016-009033 // CNNVD: CNNVD-201707-079 // NVD: CVE-2016-9038

REFERENCES

url:http://www.securityfocus.com/bid/99360

Trust: 2.2

url:https://www.talosintelligence.com/vulnerability_reports/talos-2016-0256

Trust: 1.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-9038

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2016-9038

Trust: 0.8

url:https://talosintelligence.com/vulnerability_reports/talos-2016-0256

Trust: 0.6

url:http://dell.com

Trust: 0.3

url:https://www.talosintelligence.com/reports/talos-2016-0247

Trust: 0.3

url:https://www.talosintelligence.com/reports/talos-2016-0246

Trust: 0.3

url:https://www.talosintelligence.com/reports/talos-2016-0256

Trust: 0.3

url:http://blog.talosintelligence.com/2017/06/vulnerability-spotlight-dell-precision.html

Trust: 0.3

sources: CNVD: CNVD-2017-21752 // BID: 99360 // JVNDB: JVNDB-2016-009033 // CNNVD: CNNVD-201707-079 // NVD: CVE-2016-9038

CREDITS

Marcin ???Icewall??? Noga of Cisco Talos.

Trust: 0.6

sources: CNNVD: CNNVD-201707-079

SOURCES

db:CNVDid:CNVD-2017-21752
db:BIDid:99360
db:JVNDBid:JVNDB-2016-009033
db:CNNVDid:CNNVD-201707-079
db:NVDid:CVE-2016-9038

LAST UPDATE DATE

2024-11-23T22:41:53.117000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-21752date:2017-08-18T00:00:00
db:BIDid:99360date:2017-06-30T00:00:00
db:JVNDBid:JVNDB-2016-009033date:2018-07-03T00:00:00
db:CNNVDid:CNNVD-201707-079date:2022-04-20T00:00:00
db:NVDid:CVE-2016-9038date:2024-11-21T03:00:29.330

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-21752date:2017-08-18T00:00:00
db:BIDid:99360date:2017-06-30T00:00:00
db:JVNDBid:JVNDB-2016-009033date:2018-07-03T00:00:00
db:CNNVDid:CNNVD-201707-079date:2017-06-30T00:00:00
db:NVDid:CVE-2016-9038date:2018-04-24T19:29:00.657