CVE-2018-5410

Plain English Summary

AI-powered analysis for quick understanding

An attacker can exploit a flaw in the dokan1.sys driver to send harmful data that could crash the system or allow them to run malicious code with high privileges. This vulnerability affects specific versions of the software and requires the attacker to create a device handle to access the driver.

Technical Description

Dokan, versions between 1.0.0.5000 and 1.2.0.1000, are vulnerable to a stack-based buffer overflow in the dokan1.sys driver. An attacker can create a device handle to the system driver and send arbitrary input that will trigger the vulnerability. This vulnerability was introduced in the 1.0.0.5000 version update.

CVSS Vector Analysis

Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged

Vector String

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$2,684($1K-$5K)
Vendor Response
Grade FPatched in 2606 days

Quick Information

Published

Jan 7, 2019

over 7 years ago

Last Modified

Feb 25, 2026

about 1 month ago

Vendor

dokan-dev

Product

dokany