Description
Yenkee Hornet Gaming Mouse driver GM312Fltr.sys contains a buffer overrun vulnerability that allows attackers to crash the system by sending oversized input. Attackers can exploit the driver by sending a 2000-byte buffer through DeviceIoControl to trigger a kernel-level system crash.
Problem types
Product status
Credits
Quadron Research Lab
References
www.exploit-db.com/exploits/50311
www.exploit-db.com/exploits/50311 (ExploitDB-50311)
www.yenkee.eu/ (Yenkee Vendor Webpage)
github.com/...rch-Lab/Kernel_Driver_bugs/tree/main/GM312Fltr (Quadron Research Lab Kernel Driver Bugs Repository)
www.vulncheck.com/...g-mouse-gmfltrsys-denial-of-service-poc (VulnCheck Advisory: Yenkee Hornet Gaming Mouse - 'GM312Fltr.sys' Denial of Service (PoC))