CVE-2018-5410
Plain English Summary
AI-powered analysis for quick understanding
An attacker can exploit a flaw in the dokan1.sys driver to send harmful data that could crash the system or allow them to run malicious code with high privileges. This vulnerability affects specific versions of the software and requires the attacker to create a device handle to access the driver.
Technical Description
Dokan, versions between 1.0.0.5000 and 1.2.0.1000, are vulnerable to a stack-based buffer overflow in the dokan1.sys driver. An attacker can create a device handle to the system driver and send arbitrary input that will trigger the vulnerability. This vulnerability was introduced in the 1.0.0.5000 version update.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Jan 7, 2019
over 7 years ago
Last Modified
Feb 25, 2026
about 1 month ago
Vendor
dokan-dev
Product
dokany