Out-of-Bounds Affecting veracrypt/veracrypt package, versions [,1.24)


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.06% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-VERACRYPTVERACRYPT-2369632
  • published26 Jan 2022
  • disclosed23 Jul 2019
  • creditUnknown

Introduced: 23 Jul 2019

CVE-2019-1010208  (opens in a new tab)
CWE-119  (opens in a new tab)

How to fix?

Upgrade veracrypt/veracrypt to version 1.24 or higher.

Overview

Affected versions of this package are vulnerable to Out-of-Bounds. IDRIX, Truecrypt Veracrypt, Truecrypt Prior to 1.23-Hotfix-1 (Veracrypt), all versions (Truecrypt) is affected by: Buffer Overflow. The impact is: Minor information disclosure of kernel stack. The component is: Veracrypt NT Driver (veracrypt.sys). The attack vector is: Locally executed code, IOCTL request to driver. The fixed version is: 1.23-Hotfix-1.

References

CVSS Base Scores

version 3.1