Submit #105217: IObit Malware Fighter, ObCallbackProcess.sys, DoS3info

TitleIObit Malware Fighter, ObCallbackProcess.sys, DoS3
DescriptionVersion: IObit Malware Fighter 9.4.0.776, ObCallbackProcess.sys 9.0.0.12 https://www.iobit.com/en/malware-fighter.php Impact: Denial of Service Description: From IoControlCode 0x222034, 0x222038, 0x22203C, and 0x222040, in which they call the function sub_140001BB4. There is no validation of pool boundary in the function, which may access uninitialized memory and cause BSOD. Reproduce: In the attached file DoS3.zip, there are DoS3.exe, DoS3.cpp, iobit_malware_fighter_setup.exe, and ObCallbackProcess.sys. DoS3.exe is the PoC to cause DoS where iobit_malware_fighter_setup.exe which contains the vulnerable driver ObCallbackProcess.sys is installed, and DoS3.cpp is the source code of DoS3.exe. To reproduce the issue, install iobit_malware_fighter_setup.exe and execute DoS3.exe. It is expected that the system will crash (BSOD) once DoS3.exe is executed. Password for attachment: DoS3 https://drive.google.com/file/d/1iWdqJ9PsBp1W5xINpUdQ28xbx_tB9xxf/view?usp=sharing
Source⚠️ https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned36
UserZeze7w (ID 40823)
Submission24/03/2023 10:13 (1 Year ago)
Moderation26/03/2023 22:13 (2 days later)
Accepted
Accepté
VulDB EntryVDB-224022

Do you want to use VulDB in your project?

Use the official API to access entries easily!