Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Handle the CVE, regarding Avast/AVG detections #9

Open
PatrickSchmidtSE opened this issue May 9, 2023 · 4 comments
Open

Handle the CVE, regarding Avast/AVG detections #9

PatrickSchmidtSE opened this issue May 9, 2023 · 4 comments

Comments

@PatrickSchmidtSE
Copy link

Currently all winRing0 drivers have an open CVE.

LibreHardwareMonitor/LibreHardwareMonitor#984
https://www.cvedetails.com/cve/CVE-2020-14979/

Is this something, that could be adressed here?

@GermanAizek
Copy link
Owner

@SearchForTheCode,
I didn't know about this, thank you so much for the information, I'll try to find out if there is this CVE in our sources.
Is there no public POC exploit?

@PatrickSchmidtSE
Copy link
Author

Youre welcome.
To me the problem seems to lie in the access which should use the secure methods.
image
Also here (LibreHardwareMonitor/LibreHardwareMonitor#984) they suggest to change the _PHYSICAL_MEMORY_SUPPORT .

They did not do it , because you probably need to sign the driver new, and this seems to be complicated :/

There is an article from 2019 on how to exploit, because HP used the driver on ALL notebooks ..
https://www.safebreach.com/resources/hp-touchpoint-analytics-dll-search-order-hijacking-potential-abuses-cve-2019-6333/

@GermanAizek
Copy link
Owner

@SearchForTheCode, to sign driver, an EV certificate is required, it is unlikely that I will be able to get it, since I am not a legal entity. But I am able to fix this CVE.

@PatrickSchmidtSE
Copy link
Author

Yes, thats sadly true. Hard restrictions from MS here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants