CVE-2017-7293
Vulnerability from cvelistv5
Published
2017-04-26 05:28
Modified
2024-08-05 15:56
Severity ?
EPSS score ?
Summary
The Dolby DAX2 and DAX3 API services are vulnerable to a privilege escalation vulnerability that allows a normal user to get arbitrary system privileges, because these services have .NET code for DCOM. This affects Dolby Audio X2 (DAX2) 1.0, 1.0.1, 1.1, 1.1.1, 1.2, 1.3, 1.3.1, 1.3.2, 1.4, 1.4.1, 1.4.2, 1.4.3, and 1.4.4 and Dolby Audio X3 (DAX3) 1.0 and 1.1. An example affected driver is Realtek Audio Driver 6.0.1.7898 on a Lenovo P50.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://bugs.chromium.org/p/project-zero/issues/detail?id=1075 | Issue Tracking, Third Party Advisory | |
cve@mitre.org | https://www.exploit-db.com/exploits/41933/ | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.chromium.org/p/project-zero/issues/detail?id=1075 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/41933/ | Exploit, Third Party Advisory, VDB Entry |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:56:36.336Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "41933", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/41933/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1075" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-04-26T00:00:00", "descriptions": [ { "lang": "en", "value": "The Dolby DAX2 and DAX3 API services are vulnerable to a privilege escalation vulnerability that allows a normal user to get arbitrary system privileges, because these services have .NET code for DCOM. This affects Dolby Audio X2 (DAX2) 1.0, 1.0.1, 1.1, 1.1.1, 1.2, 1.3, 1.3.1, 1.3.2, 1.4, 1.4.1, 1.4.2, 1.4.3, and 1.4.4 and Dolby Audio X3 (DAX3) 1.0 and 1.1. An example affected driver is Realtek Audio Driver 6.0.1.7898 on a Lenovo P50." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-04-26T05:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "41933", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/41933/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1075" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-7293", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Dolby DAX2 and DAX3 API services are vulnerable to a privilege escalation vulnerability that allows a normal user to get arbitrary system privileges, because these services have .NET code for DCOM. This affects Dolby Audio X2 (DAX2) 1.0, 1.0.1, 1.1, 1.1.1, 1.2, 1.3, 1.3.1, 1.3.2, 1.4, 1.4.1, 1.4.2, 1.4.3, and 1.4.4 and Dolby Audio X3 (DAX3) 1.0 and 1.1. An example affected driver is Realtek Audio Driver 6.0.1.7898 on a Lenovo P50." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "41933", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/41933/" }, { "name": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1075", "refsource": "MISC", "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1075" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-7293", "datePublished": "2017-04-26T05:28:00", "dateReserved": "2017-03-28T00:00:00", "dateUpdated": "2024-08-05T15:56:36.336Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2017-7293\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2017-04-26T05:59:00.167\",\"lastModified\":\"2024-11-21T03:31:33.577\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Dolby DAX2 and DAX3 API services are vulnerable to a privilege escalation vulnerability that allows a normal user to get arbitrary system privileges, because these services have .NET code for DCOM. This affects Dolby Audio X2 (DAX2) 1.0, 1.0.1, 1.1, 1.1.1, 1.2, 1.3, 1.3.1, 1.3.2, 1.4, 1.4.1, 1.4.2, 1.4.3, and 1.4.4 and Dolby Audio X3 (DAX3) 1.0 and 1.1. An example affected driver is Realtek Audio Driver 6.0.1.7898 on a Lenovo P50.\"},{\"lang\":\"es\",\"value\":\"Los servicios de la API DAX2 y DAX3 de Dolby presentan una vulnerabilidad de escalada de privilegios que permite a un usuario normal obtener privilegios de sistema arbitrarios, ya que estos servicios tienen c\u00f3digo .NET para DCOM. Esto afecta a Dolby Audio X2 (DAX2) en las versiones 1.0, 1.0.1, 1.1, 1.1.1, 1.2, 1.3, 1.3.1, 1.3.2, 1.4, 1.4.1, 1.4.2, 1.4.3 y 1.4.4., y Dolby Audio X3 (DAX3) en las versiones 1.0 y 1.1. Un ejemplo de controlador afectado es el Realtek Audio Driver 6.0.1.7898 en un Lenovo P50.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-502\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dolby:dolby_audio_x2:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B5A24F2-FE9F-4C27-AC52-CC0476E80ED5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dolby:dolby_audio_x2:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0084800-A70F-41CD-93FC-F9E78FFF949C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dolby:dolby_audio_x2:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EF68265-CD2A-4BBA-9C44-4DAA4FDD9CC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dolby:dolby_audio_x2:1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02A5F2F8-04B1-46B0-B2CA-8E7AB9372093\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dolby:dolby_audio_x2:1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8BDE747-FE1E-44F1-87F9-FA44211DBE26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dolby:dolby_audio_x2:1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"248E7718-E8E5-437C-93EC-5C6F0BBF0D3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dolby:dolby_audio_x2:1.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A905366A-9BBE-4BD9-8C25-10464A71F530\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dolby:dolby_audio_x2:1.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B2C8BDC-48BE-4346-A119-2F2B30BAD4DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dolby:dolby_audio_x2:1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F704ED6A-4AE9-4DAC-83CF-09C2BA640974\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dolby:dolby_audio_x2:1.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D018F50-F7C4-487F-A948-AF94C145F449\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dolby:dolby_audio_x2:1.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3108866-EF40-4309-AF5F-D82AD0C2FBA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dolby:dolby_audio_x2:1.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B58657C-DA03-44F4-A15A-D333D22AC27C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dolby:dolby_audio_x2:1.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28DE5525-6AAC-4BD0-9641-A053137D03AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dolby:dolby_audio_x3:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3190239-B092-4FF1-8F70-DD28215ED0F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dolby:dolby_audio_x3:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"774E49E1-3781-4D5D-81F2-E7B0CCC5E170\"}]}]}],\"references\":[{\"url\":\"https://bugs.chromium.org/p/project-zero/issues/detail?id=1075\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/41933/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bugs.chromium.org/p/project-zero/issues/detail?id=1075\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/41933/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.