Vulnerability Description
IPSecDrv.sys 10.4.0.12 in SafeNET HighAssurance Remote and SoftRemote allows local users to gain privileges via a crafted IPSECDRV_IOCTL IOCTL request.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Safenet | Ipsecdrv.Sys | 10.4.0.12 |
| Safenet | Safenet Highassurance Remote | 1.4.12 |
| Safenet | Softremote Vpn Client | 1.4.12 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/28701
- http://www.securityfocus.com/bid/27496Exploit
- http://www.securitytracker.com/id?1019282
- http://www.vupen.com/english/advisories/2008/0333
- https://www.exploit-db.com/exploits/5004
- http://secunia.com/advisories/28701
- http://www.securityfocus.com/bid/27496Exploit
- http://www.securitytracker.com/id?1019282
- http://www.vupen.com/english/advisories/2008/0333
- https://www.exploit-db.com/exploits/5004
FAQ
What is CVE-2008-0573?
CVE-2008-0573 is a vulnerability with a CVSS score of 7.2 (HIGH). IPSecDrv.sys 10.4.0.12 in SafeNET HighAssurance Remote and SoftRemote allows local users to gain privileges via a crafted IPSECDRV_IOCTL IOCTL request.
How severe is CVE-2008-0573?
CVE-2008-0573 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-0573?
Check the references section above for vendor advisories and patch information. Affected products include: Safenet Ipsecdrv.Sys, Safenet Safenet Highassurance Remote, Safenet Softremote Vpn Client.