Multiple vulnerabilities in ASUS GPU Tweak II



Published: 2021-04-12
Risk Low
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2021-28686
CVE-2021-28685
CWE-ID CWE-121
CWE-264
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
GPU Tweak II
Client/Desktop applications / Other client software

Vendor Asus

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Stack-based buffer overflow

EUVDB-ID: #VU52040

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-28686

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in AsIO2_64.sys and AsIO2_32.sys. A local user can send a specially crafted request, trigger stack-based buffer overflow and cause a denial of condition on the target system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

GPU Tweak II: 2.3.0.2

External links

http://gist.github.com/DStraghkov/fba4994ac4bb3a6e2940b21743563df0
http://www.asus.com/Static_WebPage/ASUS-Product-Security-Advisory/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU52041

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-28685

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in AsIO2_64.sys and AsIO2_32.sys. A local user can interact directly with physical memory via the "DeviceIoControl" and gain elevated privileges on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

GPU Tweak II: 2.3.0.2

External links

http://gist.github.com/DStraghkov/fba4994ac4bb3a6e2940b21743563df0
http://www.asus.com/Static_WebPage/ASUS-Product-Security-Advisory/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###