ASA-2018-00008 – ASRock: Drivers allow non-privileged user arbitrary physical memory read/write


Allele Security Alert

ASA-2018-00008

Identifier(s)

ASA-2018-00008, CVE-2018-10710, CORE-2018-0005

Title

Drivers allow non-privileged user arbitrary physical memory read/write

Vendor(s)

ASRock

Product(s)

ASRock RGBLED
A-Tuning
F-Stream
RestartToUEFI

Affected version(s)

The vulnerability described in this alert affects the drivers AsrDrv101.sys and AsrDrv102.sys. They are installed by the following ASRock utilities:

ASRock RGBLED before v1.0.35.1
A-Tuning before v3.0.210
F-Stream before v3.0.210
RestartToUEFI before v1.0.6.2

Fixed version(s)

ASRock RGBLED v1.0.36
A-Tuning v3.0.216
F-Stream v3.0.216
RestartToUEFI v1.0.7

Proof of concept

Yes

Description

The drivers affected expose to a non-privileged user arbitrary access to physical memory through ioctl() system call. The ioctl argument for writing to physical memory is 0x22280C.

Access to physical memory allows an attacker to directly tinker with the system and take advantage in several ways. This vulnerability allows an attacker to achieve privilege escalation, information leakage, denial of service and not limited to bypassing of mitigations and protections imposed by operating system.

Technical details

Unknown

Credits

Diego Juarez (SecureAuth) and Leandro Cuozzo (SecureAuth)

Reference(s)

ASRock Drivers Elevation of Privilege Vulnerabilities
https://www.secureauth.com/labs/advisories/asrock-drivers-elevation-privilege-vulnerabilities

CVE-2018-10710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10710

CVE-2018-10710
https://nvd.nist.gov/vuln/detail/CVE-2018-10710

If there is any error in this alert or you wish a comprehensive analysis, let us know.

Last modified: February 3, 2019

We are not responsible for any data loss, device corruption or any other type of issue due to the use of any information mentioned in our security alerts.