Zero-friction vulnerability management platform

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

SlySoft Product(s) Code Execution Vulnerability

Information

Severity

Severity

Medium

Family

Family

Buffer overflow

CVSSv2 Base

CVSSv2 Base

4.9

CVSSv2 Vector

CVSSv2 Vector

AV:L/AC:L/Au:N/C:N/I:N/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

13 years ago

Modified

Modified

3 years ago

Summary

This host is installed with SlySoft Products and is prone to a Code Execution Vulnerability.

Insight

Insight

METHOD_NEITHER communication method for IOCTLs does not properly validate a buffer associated with the Irp object of user space data provided to the ElbyCDIO.sys kernel driver.

Affected Software

Affected Software

SlySoft AnyDVD version prior to 6.5.2.6. SlySoft CloneCD version 5.3.1.3 and prior. SlySoft CloneDVD version 2.9.2.0 and prior. SlySoft Virtual CloneDrive version 5.4.2.3 and prior.

Solution

Solution

Upgrade to higher versions accordingly.

Common Vulnerabilities and Exposures (CVE)