{"vuid":"VU#146896","idnumber":"146896","name":"Gear Software CD DVD Filter driver privilege escalation vulnerability","keywords":["Gear Software","Symantec","Apple iTunes","driver","CD DVD filter","IoAttachDevice"],"overview":"The Gear Software CD DVD Filter driver contains a privilege escalation vulnerability, which can allow an attacker to gain SYSTEM privileges.","clean_desc":"Gear Software provides a driver called CD DVD Filter, which is provided by GEARAspiWDM.sys. This driver is used by multiple CD/DVD recording applications. The Gear Software CD DVD Filter driver allows unlimited calls to IoAttachDevice from a user-space application. By making multiple calls to IoAttachDevice, an attacker may be able to exploit an integer overflow in the Microsoft Windows kernel to execute code with SYSTEM privileges.","impact":"An attacker may be able to execute code with SYSTEM privileges.","resolution":"Apply an update\nThis issue is addressed in GEAR driver version 4.001.7, which provides GEARAspiWDM.sys version 2.0.7.5. This version of the CD DVD Filter driver limits the number of IoAttachDevice calls that can be made. Please check with your software vendor for updates that contains this fixed driver. If no update is available, the stand-alone driver from GEAR may be installed. Apple iTunes users should install iTunes 8.0, as specified in the About the security content of iTunes 8.0 document. Symantec customers using Norton 360, Norton Ghost, Norton Save and Restore, Backup Exec System Recovery, and Symantec LiveState Recovery should apply an update, as specified in the Symantec Security Advisory SYM08-017.","workarounds":"","sysaffected":"","thanks":"Thanks to  \nRuben Santamarta of \nWintercore\n for reporting this vulnerability by way of the Microsoft Security Response Center.","author":"This document was written by Will Dormann.","public":["http://www.wintercore.com/advisories/advisory_W021008.html","http://lists.apple.com/archives/security-announce//2008/Sep/msg00001.html","http://support.apple.com/kb/HT3025","http://securityresponse.symantec.com/avcenter/security/Content/2008.10.07a.html"],"cveids":["CVE-2008-3636"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2008-03-12T20:16:36Z","publicdate":"2008-10-07T00:00:00Z","datefirstpublished":"2008-10-07T20:29:52Z","dateupdated":"2008-10-07T20:35:01Z","revision":14,"vrda_d1_directreport":"1","vrda_d1_population":"4","vrda_d1_impact":"4","cam_widelyknown":"10","cam_exploitation":"0","cam_internetinfrastructure":"8","cam_population":"14","cam_impact":"20","cam_easeofexploitation":"6","cam_attackeraccessrequired":"10","cam_scorecurrent":"5.67","cam_scorecurrentwidelyknown":"8.82","cam_scorecurrentwidelyknownexploited":"15.12","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":5.67,"vulnote":null}