Conexant Systems mictray64 task, as used on HP Elite, EliteBook, ProBook, and ZBook systems, leaks sensitive data (keystrokes) to any process. In mictray64.exe (mic tray icon) 1.0.0.46, a LowLevelKeyboardProc Windows hook is used to capture keystrokes. This data is leaked via unintended channels: debug messages accessible to any process that is running in the current user session, and filesystem access to C:\Users\Public\MicTray.log by any process.
References
Link | Resource |
---|---|
http://www.securitytracker.com/id/1038527 | |
https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt | Exploit Mitigation Technical Description Third Party Advisory |
https://www.modzero.ch/modlog/archives/2017/05/11/en_keylogger_in_hewlett-packard_audio_driver/index.html | Exploit Technical Description Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2017-05-12T06:54:00
Updated: 2017-07-07T09:57:01
Reserved: 2017-04-30T00:00:00
Link: CVE-2017-8360
JSON object: View
NVD Information
Status : Modified
Published: 2017-05-12T07:29:00.187
Modified: 2017-07-08T01:29:18.210
Link: CVE-2017-8360
JSON object: View
Redhat Information
No data.
CWE