← Volver a CVEs
CVE-2025-64721
CRITICAL10.0
Descripcion
Sandboxie is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. In versions 1.16.6 and below, the SYSTEM-level service SbieSvc.exe exposes SbieIniServer::RC4Crypt to sandboxed processes. The handler adds a fixed header size to a caller-controlled value_len without overflow checking. A large value_len (e.g., 0xFFFFFFF0) wraps the allocation size, causing a heap overflow when attacker data is copied into the undersized buffer. This allows sandboxed processes to execute arbitrary code as SYSTEM, fully compromising the host. This issue is fixed in version 1.16.7.
Detalles CVE
Puntuacion CVSS v3.110.0
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado12/11/2025
Ultima modificacion12/22/2025
Fuentenvd
Avistamientos honeypot0
Productos afectados
sandboxie-plus:sandboxie
Debilidades (CWE)
CWE-190
Referencias
https://github.com/sandboxie-plus/Sandboxie/commit/000492f8c411d24292f1b977a107994347bc7dfa(security-advisories@github.com)
https://github.com/sandboxie-plus/Sandboxie/releases/tag/v1.16.7(security-advisories@github.com)
https://github.com/sandboxie-plus/Sandboxie/security/advisories/GHSA-w476-j57g-96vp(security-advisories@github.com)
https://github.com/sandboxie-plus/Sandboxie/security/advisories/GHSA-w476-j57g-96vp(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.