{"containers":{"cna":{"affected":[{"product":"Open Source File System","vendor":"Dokan","versions":[{"lessThan":"1.0.0.5000*","status":"affected","version":"1.0.0.5000","versionType":"custom"},{"lessThanOrEqual":"1.2.0.1000","status":"affected","version":"1.2.0.1000","versionType":"custom"}]}],"credits":[{"lang":"en","value":"Thanks to Parvez Anwar for reporting this vulnerability."}],"datePublic":"2019-01-07T00:00:00.000Z","descriptions":[{"lang":"en","value":"Dokan, versions between 1.0.0.5000 and 1.2.0.1000, are vulnerable to a stack-based buffer overflow in the dokan1.sys driver. An attacker can create a device handle to the system driver and send arbitrary input that will trigger the vulnerability. This vulnerability was introduced in the 1.0.0.5000 version update."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-121","description":"CWE-121: Stack-based Buffer Overflow","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2019-01-15T10:57:01.000Z","orgId":"37e5125f-f79b-445b-8fad-9564f167944b","shortName":"certcc"},"references":[{"name":"VU#741315","tags":["third-party-advisory","x_refsource_CERT-VN"],"url":"https://kb.cert.org/vuls/id/741315/"},{"name":"46155","tags":["exploit","x_refsource_EXPLOIT-DB"],"url":"https://www.exploit-db.com/exploits/46155/"},{"tags":["x_refsource_MISC"],"url":"https://cwe.mitre.org/data/definitions/121.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://github.com/dokan-dev/dokany/releases/tag/v1.2.1.1000"},{"name":"106274","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/106274"}],"solutions":[{"lang":"en","value":"Dokan developers have released a new version, 1.2.1, that fixes this vulnerability by validating the user input."}],"source":{"discovery":"UNKNOWN"},"title":"Dokan file system driver contains a stack-based buffer overflow","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cert@cert.org","ID":"CVE-2018-5410","STATE":"PUBLIC","TITLE":"Dokan file system driver contains a stack-based buffer overflow"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Open Source File System","version":{"version_data":[{"affected":">=","version_affected":">=","version_name":"1.0.0.5000","version_value":"1.0.0.5000"},{"affected":"<=","version_affected":"<=","version_name":"1.2.0.1000","version_value":"1.2.0.1000"}]}}]},"vendor_name":"Dokan"}]}},"credit":[{"lang":"eng","value":"Thanks to Parvez Anwar for reporting this vulnerability."}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Dokan, versions between 1.0.0.5000 and 1.2.0.1000, are vulnerable to a stack-based buffer overflow in the dokan1.sys driver. An attacker can create a device handle to the system driver and send arbitrary input that will trigger the vulnerability. This vulnerability was introduced in the 1.0.0.5000 version update."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-121: Stack-based Buffer Overflow"}]}]},"references":{"reference_data":[{"name":"VU#741315","refsource":"CERT-VN","url":"https://kb.cert.org/vuls/id/741315/"},{"name":"46155","refsource":"EXPLOIT-DB","url":"https://www.exploit-db.com/exploits/46155/"},{"name":"https://cwe.mitre.org/data/definitions/121.html","refsource":"MISC","url":"https://cwe.mitre.org/data/definitions/121.html"},{"name":"https://github.com/dokan-dev/dokany/releases/tag/v1.2.1.1000","refsource":"CONFIRM","url":"https://github.com/dokan-dev/dokany/releases/tag/v1.2.1.1000"},{"name":"106274","refsource":"BID","url":"http://www.securityfocus.com/bid/106274"}]},"solution":[{"lang":"en","value":"Dokan developers have released a new version, 1.2.1, that fixes this vulnerability by validating the user input."}],"source":{"discovery":"UNKNOWN"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T05:33:44.211Z"},"title":"CVE Program Container","references":[{"name":"VU#741315","tags":["third-party-advisory","x_refsource_CERT-VN","x_transferred"],"url":"https://kb.cert.org/vuls/id/741315/"},{"name":"46155","tags":["exploit","x_refsource_EXPLOIT-DB","x_transferred"],"url":"https://www.exploit-db.com/exploits/46155/"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://cwe.mitre.org/data/definitions/121.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/dokan-dev/dokany/releases/tag/v1.2.1.1000"},{"name":"106274","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/106274"}]}]},"cveMetadata":{"assignerOrgId":"37e5125f-f79b-445b-8fad-9564f167944b","assignerShortName":"certcc","cveId":"CVE-2018-5410","datePublished":"2019-01-07T14:00:00.000Z","dateReserved":"2018-01-12T00:00:00.000Z","dateUpdated":"2024-08-05T05:33:44.211Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}