FKIE_CVE-2017-7293

Vulnerability from fkie_nvd - Published: 2017-04-26 05:59 - Updated: 2025-04-20 01:37
Summary
The Dolby DAX2 and DAX3 API services are vulnerable to a privilege escalation vulnerability that allows a normal user to get arbitrary system privileges, because these services have .NET code for DCOM. This affects Dolby Audio X2 (DAX2) 1.0, 1.0.1, 1.1, 1.1.1, 1.2, 1.3, 1.3.1, 1.3.2, 1.4, 1.4.1, 1.4.2, 1.4.3, and 1.4.4 and Dolby Audio X3 (DAX3) 1.0 and 1.1. An example affected driver is Realtek Audio Driver 6.0.1.7898 on a Lenovo P50.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:dolby:dolby_audio_x2:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B5A24F2-FE9F-4C27-AC52-CC0476E80ED5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dolby:dolby_audio_x2:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0084800-A70F-41CD-93FC-F9E78FFF949C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dolby:dolby_audio_x2:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EF68265-CD2A-4BBA-9C44-4DAA4FDD9CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dolby:dolby_audio_x2:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "02A5F2F8-04B1-46B0-B2CA-8E7AB9372093",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dolby:dolby_audio_x2:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BDE747-FE1E-44F1-87F9-FA44211DBE26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dolby:dolby_audio_x2:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "248E7718-E8E5-437C-93EC-5C6F0BBF0D3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dolby:dolby_audio_x2:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A905366A-9BBE-4BD9-8C25-10464A71F530",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dolby:dolby_audio_x2:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B2C8BDC-48BE-4346-A119-2F2B30BAD4DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dolby:dolby_audio_x2:1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F704ED6A-4AE9-4DAC-83CF-09C2BA640974",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dolby:dolby_audio_x2:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D018F50-F7C4-487F-A948-AF94C145F449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dolby:dolby_audio_x2:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3108866-EF40-4309-AF5F-D82AD0C2FBA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dolby:dolby_audio_x2:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B58657C-DA03-44F4-A15A-D333D22AC27C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dolby:dolby_audio_x2:1.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "28DE5525-6AAC-4BD0-9641-A053137D03AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dolby:dolby_audio_x3:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3190239-B092-4FF1-8F70-DD28215ED0F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dolby:dolby_audio_x3:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "774E49E1-3781-4D5D-81F2-E7B0CCC5E170",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Dolby DAX2 and DAX3 API services are vulnerable to a privilege escalation vulnerability that allows a normal user to get arbitrary system privileges, because these services have .NET code for DCOM. This affects Dolby Audio X2 (DAX2) 1.0, 1.0.1, 1.1, 1.1.1, 1.2, 1.3, 1.3.1, 1.3.2, 1.4, 1.4.1, 1.4.2, 1.4.3, and 1.4.4 and Dolby Audio X3 (DAX3) 1.0 and 1.1. An example affected driver is Realtek Audio Driver 6.0.1.7898 on a Lenovo P50."
    },
    {
      "lang": "es",
      "value": "Los servicios de la API DAX2 y DAX3 de Dolby presentan una vulnerabilidad de escalada de privilegios que permite a un usuario normal obtener privilegios de sistema arbitrarios, ya que estos servicios tienen c\u00f3digo .NET para DCOM. Esto afecta a Dolby Audio X2 (DAX2) en las versiones 1.0, 1.0.1, 1.1, 1.1.1, 1.2, 1.3, 1.3.1, 1.3.2, 1.4, 1.4.1, 1.4.2, 1.4.3 y 1.4.4., y Dolby Audio X3 (DAX3) en las versiones 1.0 y 1.1. Un ejemplo de controlador afectado es el Realtek Audio Driver 6.0.1.7898 en un Lenovo P50."
    }
  ],
  "id": "CVE-2017-7293",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-04-26T05:59:00.167",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1075"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.exploit-db.com/exploits/41933/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1075"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.exploit-db.com/exploits/41933/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-502"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…