CVE-2024-10972

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-10972
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-10972.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-10972
Published
2024-12-16T15:15:06Z
Modified
2025-05-28T10:37:46.611658Z
Summary
[none]
Details

Velocidex WinPmem versions 4.1 and below suffer from an Improper Input Validation vulnerability whereby an attacker with admin access can trigger a BSOD with a parallel thread changing the memory’s access right under the control of the user-mode application. This is due to verification only being performed at the beginning of the routine allowing the userspace to change page permissions half way through the routine.  A valid workaround is a rule to detect unauthorized loading of winpmem outside incident response operations.

References

Affected packages

Git / github.com/velocidex/winpmem

Affected ranges

Type
GIT
Repo
https://github.com/velocidex/winpmem
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v4.*

v4.0.rc1