The AscRegistryFilter.sys kernel driver in IObit Advanced SystemCare 13.2 allows an unprivileged user to send an IOCTL to the device driver. If the user provides a NULL entry for the dwIoControlCode parameter, a kernel panic (aka BSOD) follows. The IOCTL codes can be found in the dispatch function: 0x8001E000, 0x8001E004, 0x8001E008, 0x8001E00C, 0x8001E010, 0x8001E014, 0x8001E020, 0x8001E024, 0x8001E040, 0x8001E044, and 0x8001E048. \DosDevices\AscRegistryFilter and \Device\AscRegistryFilter are affected.
References
Link | Resource |
---|---|
https://github.com/FULLSHADE/Kernel-exploits | Third Party Advisory |
https://github.com/FULLSHADE/Kernel-exploits/tree/master/AscRegistryFilter.sys | Exploit Third Party Advisory |
https://www.iobit.com/en/advancedsystemcarefree.php | Product Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-02-05T18:58:10
Updated: 2021-02-05T18:58:10
Reserved: 2020-03-09T00:00:00
Link: CVE-2020-10234
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-02-05T19:15:11.853
Modified: 2021-02-08T22:00:26.363
Link: CVE-2020-10234
JSON object: View
Redhat Information
No data.
CWE