Zemana AntiLogger - Kernel Memory Leak
5,5
Medium
Discovered by

Offensive Team, Fluid Attacks
Summary
Full name
Zemana AntiLogger v2.74.204.664 - Kernel Memory Leak
Code name
State
Public
Release date
14 mar 2024
Affected product
Zemana AntiLogger
Vendor
Zemana Ltd.
Affected version(s)
Version 2.74.204.664
Vulnerability name
Kernel Memory Leak
Vulnerability type
Remotely exploitable
No
CVSS v3.0 vector string
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS v3.0 base score
5.5
Exploit available
Yes
CVE ID(s)
Description
Zemana AntiLogger v2.74.204.664 is vulnerable to a Memory Information Leak vulnerability by triggering the 0x80002020
IOCTL code of the zam64.sys
and zamguard64.sys
drivers.
Vulnerability
The 0x80002020
IOCTL code of the zam64.sys
and zamguard64.sys
drivers allow to leak the kernel base address, making the kASLR
protection useless.
In order to perform calls to any IOCTL of the zam64.sys
and zamguard64.sys
driver, a call to the IOCTL 0x80002010
must be performed with the current process ID as an authorized IOCTL process caller:
The handling code of the 0x80002020
IOCTL calls sub_14000B828
which performs a call to ZwQuerySystemInformation
, using SystemModuleInformation (0xB)
as first parameter.
The output buffer is populated with the information returned by ZwQuerySystemInformation
. Notice the first returned QWORD
:
It matches with the kernel base address as fetched from the debugger:
Our security policy
We have reserved the ID CVE-2024-2180 to refer to this issue from now on.
System Information
Version: Zemana AntiLogger v2.74.204.664
Operating System: Windows
Mitigation
There is currently no patch available for this vulnerability.
References
Vendor page https://zemana.com/
Product page https://zemana.com/us/antilogger.html
Timeline
IA generativa
23 feb 2024
Vendor contacted
4 mar 2024
Public disclosure
14 mar 2024