Home

Description

Sandboxie is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. In versions 1.16.6 and below, the SYSTEM-level service SbieSvc.exe exposes SbieIniServer::RC4Crypt to sandboxed processes. The handler adds a fixed header size to a caller-controlled value_len without overflow checking. A large value_len (e.g., 0xFFFFFFF0) wraps the allocation size, causing a heap overflow when attacker data is copied into the undersized buffer. This allows sandboxed processes to execute arbitrary code as SYSTEM, fully compromising the host. This issue is fixed in version 1.16.7.

PUBLISHED Reserved 2025-11-10 | Published 2025-12-11 | Updated 2025-12-15 | Assigner GitHub_M




CRITICAL: 9.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:N

Problem types

CWE-190: Integer Overflow or Wraparound

Product status

< 1.16.7
affected

References

github.com/...dboxie/security/advisories/GHSA-w476-j57g-96vp exploit

github.com/...dboxie/security/advisories/GHSA-w476-j57g-96vp

github.com/...ommit/000492f8c411d24292f1b977a107994347bc7dfa

github.com/sandboxie-plus/Sandboxie/releases/tag/v1.16.7

cve.org (CVE-2025-64721)

nvd.nist.gov (CVE-2025-64721)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.