Netskope was made aware of a security vulnerability in...
Moderate severity
Unreviewed
Published
Dec 19, 2024
to the GitHub Advisory Database
•
Updated Dec 19, 2024
Description
Published by the National Vulnerability Database
Dec 19, 2024
Published to the GitHub Advisory Database
Dec 19, 2024
Last updated
Dec 19, 2024
Netskope was made aware of a security vulnerability in Netskope Endpoint DLP’s Content Control Driver where a double-fetch issue leads to heap overflow. The vulnerability arises from the fact that the NumberOfBytes argument to ExAllocatePoolWithTag, and the Length argument for RtlCopyMemory, both independently dereference their value from the user supplied input buffer inside the EpdlpSetUsbAction function, known as a double-fetch. If this length value grows to a higher value in between these two calls, it will result in the RtlCopyMemory call copying user-supplied memory contents outside the range of the allocated buffer, resulting in a heap overflow. A malicious attacker will need admin privileges to exploit the issue.
This issue affects Endpoint DLP version below R119.
References